Denial of Service Vulnerability in Microsoft Hyper-V Network Switch
CVE-2017-0186
5.8MEDIUM
Summary
A gap in input validation within the Microsoft Hyper-V Network Switch allows a malicious privileged user on a guest operating system to execute denial of service attacks. This arises from improper handling of input, resulting in potential system instability or outages. Affected systems include various Windows versions, making it crucial for administrators to apply recommended security updates and mitigations to safeguard their environments from related threats.
Affected Version(s)
Hyper-V Windows 10, Windows 8.1, Windows Server 2012, Windows Server 2012 R2, and Windows Server 2016
References
CVSS V3.1
Score:
5.8
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
High
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved