CVE-2020-16891

Severity
8.8HIGH
EPSS
0.4%
top 39.20%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 16
Latest updateMay 24

Description

A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code. An attacker who successfully exploited the vulnerability could execute arbitrary code on the host operating system. The security update ad

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:HExploitability: 2.0 | Impact: 6.0

Affected Packages25 packages

CVEListV5microsoft/windows_server_20126.2.0publication
CVEListV5microsoft/windows_server_201610.0.0publication
CVEListV5microsoft/windows_server_201910.0.0publication
CVEListV5microsoft/windows_server_2012_r26.3.0publication

Patches

🔴Vulnerability Details

2
GHSA
GHSA-fj3r-5xm4-3r4m: A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a gu2022-05-24
CVEList
Windows Hyper-V Remote Code Execution Vulnerability2020-10-16

📋Vendor Advisories

1
Microsoft
Windows Hyper-V Remote Code Execution Vulnerability2020-10-13