CVE-2019-0720

Severity
8.0HIGH
EPSS
0.7%
top 27.15%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 14
Latest updateMay 24

Description

A remote code execution vulnerability exists when Windows Hyper-V Network Switch on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code. An attacker who successfully exploited the vulnerability could execute arbitrary code on the host operating system. The sec

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:HExploitability: 1.3 | Impact: 6.0

Affected Packages22 packages

CVEListV5microsoft/windows_server_20126.2.0publication
CVEListV5microsoft/windows_server_201610.0.0publication
CVEListV5microsoft/windows_server_201910.0.0publication
CVEListV5microsoft/windows_server_2012_r26.3.0publication
CVEListV5microsoft/windows_server_2008_service_pack_26.0.0publication

Patches

🔴Vulnerability Details

2
GHSA
GHSA-g8mh-95ff-hf7w: A remote code execution vulnerability exists when Windows Hyper-V Network Switch on a host server fails to properly validate input from an authenticat2022-05-24
CVEList
Hyper-V Remote Code Execution Vulnerability2019-08-14

📋Vendor Advisories

1
Microsoft
Hyper-V Remote Code Execution Vulnerability2019-08-13