CVE-2017-0163 — Improper Input Validation in Corporation Windows Hyper-v
Severity
7.6HIGHNVD
EPSS
0.4%
top 40.41%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 12
Latest updateMay 17
Description
A remote code execution vulnerability exists when Windows Hyper-V Network Switch running on a host server fails to properly validate input from an authenticated user on a guest operating system, aka "Hyper-V Remote Code Execution Vulnerability." This CVE ID is unique from CVE-2017-0162, CVE-2017-0180, and CVE-2017-0181.
CVSS vector
CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:HExploitability: 1.0 | Impact: 6.0
Affected Packages13 packages
Patches
🔴Vulnerability Details
4GHSA▶
GHSA-xm6m-mhj5-wwv5: A remote code execution vulnerability exists when Windows Hyper-V Network Switch running on a host server fails to properly validate input from an aut↗2022-05-17
GHSA▶
GHSA-wffg-444q-6mw8: A remote code execution vulnerability exists when Windows Hyper-V Network Switch running on a Windows 10, Windows 8↗2022-05-17
GHSA▶
GHSA-v4r4-q4jh-rhvg: A remote code execution vulnerability exists when Windows Hyper-V Network Switch running on a host server fails to properly validate input from an aut↗2022-05-17
GHSA▶
GHSA-96j5-32rm-vphf: A remote code execution vulnerability exists when Windows Hyper-V Network Switch running on a Windows 10 or Windows Server 2016 host server fails to p↗2022-05-17
📋Vendor Advisories
1🕵️Threat Intelligence
2💬Community
1Bugzilla▶
CVE-2017-15134 389-ds-base: Remote DoS via search filters in slapi_filter_sprintf in slapd/util.c↗2018-01-05