CVE-2019-0721 — Improper Input Validation in Microsoft Windows
Severity
9.1CRITICALNVD
EPSS
2.0%
top 16.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 12
Latest updateMay 24
Description
A remote code execution vulnerability exists when Windows Hyper-V Network Switch on a host server fails to properly validate input from an authenticated user on a guest operating system, aka 'Hyper-V Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0719.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:HExploitability: 2.3 | Impact: 6.0
Affected Packages5 packages
Patches
🔴Vulnerability Details
4GHSA▶
GHSA-c9x8-4v35-37qf: A remote code execution vulnerability exists when Windows Hyper-V Network Switch on a host server fails to properly validate input from an authenticat↗2022-05-24
GHSA▶
GHSA-wgjq-j646-4ghv: A remote code execution vulnerability exists when Windows Hyper-V Network Switch on a host server fails to properly validate input from an authenticat↗2022-05-24
CVEList▶
CVE-2019-0721: A remote code execution vulnerability exists when Windows Hyper-V Network Switch on a host server fails to properly validate input from an authenticat↗2019-11-12
CVEList▶
CVE-2019-0719: A remote code execution vulnerability exists when Windows Hyper-V Network Switch on a host server fails to properly validate input from an authenticat↗2019-11-12
💥Exploits & PoCs
3📋Vendor Advisories
1🕵️Threat Intelligence
7Qualys▶
November 2019 Patch Tuesday – 74 vulns, 13 Critical, Actively Attacked IE vuln, Hyper-V escapes, Adobe↗2019-11-12