<p>A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code.</p> <p>An attacker who successfully exploited the vulnerability could execute arbitrary code on the host operating system.</p> <p>The security update addresses the vulnerability by correcting how Hyper-V validates guest operating system user input.</p>
2020-10-16T23:15:13.040
2024-11-21T05:07:20.043
Modified
CVSSv3.1: 8.8 (HIGH)
AV:L/AC:L/Au:N/C:C/I:C/A:C
3.9
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | microsoft | windows_10 | - | Yes |
Operating System | microsoft | windows_10 | 1607 | Yes |
Operating System | microsoft | windows_10 | 1709 | Yes |
Operating System | microsoft | windows_10 | 1803 | Yes |
Operating System | microsoft | windows_10 | 1809 | Yes |
Operating System | microsoft | windows_10 | 1903 | Yes |
Operating System | microsoft | windows_10 | 1909 | Yes |
Operating System | microsoft | windows_10 | 2004 | Yes |
Operating System | microsoft | windows_7 | - | Yes |
Operating System | microsoft | windows_8.1 | - | Yes |
Operating System | microsoft | windows_server_2008 | - | Yes |
Operating System | microsoft | windows_server_2008 | r2 | Yes |
Operating System | microsoft | windows_server_2012 | - | Yes |
Operating System | microsoft | windows_server_2012 | r2 | Yes |
Operating System | microsoft | windows_server_2016 | - | Yes |
Operating System | microsoft | windows_server_2016 | 1903 | Yes |
Operating System | microsoft | windows_server_2016 | 1909 | Yes |
Operating System | microsoft | windows_server_2016 | 2004 | Yes |
Operating System | microsoft | windows_server_2019 | - | Yes |