Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2024-49117

Опубликовано: 10 дек. 2024
Источник: msrc
CVSS3: 8.8
EPSS Низкий

Описание

Windows Hyper-V Remote Code Execution Vulnerability

FAQ

How would an attacker exploit this vulnerability?

This vulnerability would require an authenticated attacker on a guest VM to send specially crafted file operation requests on the VM to hardware resources on the VM which could result in remote code execution on the host server.

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. The vulnerable endpoint is only available over the local VM interface as all external communication is blocked. This means an attacker needs to execute code from the local machine to exploit the vulnerability.

According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.

According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

An attacker who successfully exploited this vulnerability could potentially execute a cross-VM attack, thereby compromising multiple virtual machines and expanding the impact of the attack beyond the initially targeted VM.

Обновления

ПродуктСтатьяОбновление
Windows Server 2022
Windows Server 2022 (Server Core installation)
Windows 11 Version 22H2 for ARM64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows 11 Version 23H2 for x64-based Systems
Windows Server 2022, 23H2 Edition (Server Core installation)
Windows 11 Version 24H2 for ARM64-based Systems
Windows 11 Version 24H2 for x64-based Systems
Windows Server 2025

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 51%
0.00282
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
6 месяцев назад

Windows Hyper-V Remote Code Execution Vulnerability

CVSS3: 8.8
github
6 месяцев назад

Windows Hyper-V Remote Code Execution Vulnerability

CVSS3: 8.8
fstec
6 месяцев назад

Уязвимость системы аппаратной виртуализации Windows Hyper-V операционной системы Windows, связанная с возвратом неверного кода состояния, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 51%
0.00282
Низкий

8.8 High

CVSS3