Privilege Escalation Issue in Microsoft Virtual Machine Monitor
CVE-2009-1542
Currently unrated
Summary
The Virtual Machine Monitor (VMM) in Microsoft Virtual PC and Microsoft Virtual Server allows unprivileged users in guest operating systems to execute arbitrary kernel-mode code. This occurs due to the VMM not enforcing CPU privilege-level requirements for certain machine instructions. By using specially crafted applications, an attacker can gain elevated privileges within the guest OS, potentially leading to unauthorized access and system control.
References
EPSS Score
18% chance of being exploited in the next 30 days.
Timeline
Vulnerability published
Vulnerability Reserved