Remote Code Execution Vulnerability in Microsoft Windows Hyper-V
CVE-2017-8664
8.8HIGH
Summary
The vulnerability in Microsoft's Windows Hyper-V arises from insufficient validation of input provided by a privileged user within a guest operating system. This weakness potentially allows an attacker to execute arbitrary code on the host system, leading to significant security risks. Affected versions include Windows 8.1, multiple editions of Windows 10, as well as Windows Server 2012, 2016, and related R2 versions. Users are advised to update their systems to mitigate risks associated with this vulnerability.
Affected Version(s)
Windows Hyper-V Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved