CVE-2017-0163Improper Input Validation in Corporation Windows Hyper-v

Severity
7.6HIGHNVD
EPSS
0.4%
top 40.41%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 12
Latest updateMay 17

Description

A remote code execution vulnerability exists when Windows Hyper-V Network Switch running on a host server fails to properly validate input from an authenticated user on a guest operating system, aka "Hyper-V Remote Code Execution Vulnerability." This CVE ID is unique from CVE-2017-0162, CVE-2017-0180, and CVE-2017-0181.

CVSS vector

CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:HExploitability: 1.0 | Impact: 6.0

Patches

🔴Vulnerability Details

4
GHSA
GHSA-xm6m-mhj5-wwv5: A remote code execution vulnerability exists when Windows Hyper-V Network Switch running on a host server fails to properly validate input from an aut2022-05-17
GHSA
GHSA-wffg-444q-6mw8: A remote code execution vulnerability exists when Windows Hyper-V Network Switch running on a Windows 10, Windows 82022-05-17
GHSA
GHSA-v4r4-q4jh-rhvg: A remote code execution vulnerability exists when Windows Hyper-V Network Switch running on a host server fails to properly validate input from an aut2022-05-17
GHSA
GHSA-96j5-32rm-vphf: A remote code execution vulnerability exists when Windows Hyper-V Network Switch running on a Windows 10 or Windows Server 2016 host server fails to p2022-05-17

📋Vendor Advisories

1
Microsoft
Hyper-V Remote Code Execution Vulnerability2017-04-11

🕵️Threat Intelligence

2
Qualys
Microsoft Fixes 45 Vulnerabilities with new Security Update Guide – says goodbye to Security Bulletins2017-04-11
Qualys
Microsoft Fixes 45 Vulnerabilities with new Security Update Guide - says goodbye to Security Bulletins | Qualys2017-04-11

💬Community

1
Bugzilla
CVE-2017-15134 389-ds-base: Remote DoS via search filters in slapi_filter_sprintf in slapd/util.c2018-01-05