Remote Code Execution Vulnerability in Windows Hyper-V Network Switch
CVE-2017-0180
7.6HIGH
Summary
A remote code execution vulnerability in the Windows Hyper-V Network Switch arises when the system fails to accurately validate input from an authenticated user operating within a guest OS. This flaw could potentially allow attackers to execute arbitrary code on the host server, impacting the security and integrity of the virtualized environments managed by Hyper-V. It is essential for users and administrators to apply security patches and follow best practices to mitigate risks associated with this vulnerability.
Affected Version(s)
Windows Hyper-V Windows
References
CVSS V3.1
Score:
7.6
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
High
Privileges Required:
High
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved