Описание
Windows Hyper-V Elevation of Privilege Vulnerability
FAQ
According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?
Successful exploitation of this vulnerability could allow a Hyper-V guest to affect the functionality of the Hyper-V host.
What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker on a Nested Hyper-V environment would gain Level 1 Hyper-V Windows Root OS privileges. For diagrams and more detailed information please see Run Hyper-V in a Virtual Machine with Nested Virtualization.
Обновления
Продукт | Статья | Обновление |
---|---|---|
Windows Server 2016 | ||
Windows 10 Version 1607 for x64-based Systems | ||
Windows Server 2016 (Server Core installation) | ||
Windows 10 Version 1809 for x64-based Systems | ||
Windows Server 2019 | ||
Windows Server 2019 (Server Core installation) | ||
Windows 10 Version 21H1 for x64-based Systems | ||
Windows Server 2022 | ||
Windows Server 2022 (Server Core installation) | ||
Windows 11 version 21H2 for x64-based Systems |
Показывать по
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
Older Software Release
DOS
EPSS
7.8 High
CVSS3
Связанные уязвимости
Windows Hyper-V Elevation of Privilege Vulnerability.
Уязвимость системы аппаратной виртуализации Windows Hyper-V операционной системы Windows, позволяющая нарушителю повысить свои привилегии
EPSS
7.8 High
CVSS3