Unrated severityNVD Advisory· Published Oct 16, 2020· Updated Aug 4, 2024
Windows Hyper-V Remote Code Execution Vulnerability
CVE-2020-16891
Description
<p>A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code.</p> <p>An attacker who successfully exploited the vulnerability could execute arbitrary code on the host operating system.</p> <p>The security update addresses the vulnerability by correcting how Hyper-V validates guest operating system user input.</p>
Affected products
11cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*range: 10.0.0
- cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*range: 10.0.0
- cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*Range: 6.2.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16891mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.