Remote Code Execution Vulnerability in Windows Hyper-V Network Switch
CVE-2017-0180

7.6HIGH

Key Information:

Vendor
Microsoft
Vendor
CVE Published:
12 April 2017

Summary

A remote code execution vulnerability in the Windows Hyper-V Network Switch arises when the system fails to accurately validate input from an authenticated user operating within a guest OS. This flaw could potentially allow attackers to execute arbitrary code on the host server, impacting the security and integrity of the virtualized environments managed by Hyper-V. It is essential for users and administrators to apply security patches and follow best practices to mitigate risks associated with this vulnerability.

Affected Version(s)

Windows Hyper-V Windows

References

CVSS V3.1

Score:
7.6
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
High
Privileges Required:
High
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.