Rapid7 Vulnerability & Exploit Database

MS16-045: Security Update for Windows Hyper-V (3143118)

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

MS16-045: Security Update for Windows Hyper-V (3143118)

Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
04/12/2016
Created
07/25/2018
Added
04/12/2016
Modified
11/18/2021

Description

A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code. Customers who have not enabled the Hyper-V role are not affected.

Solution(s)

  • WINDOWS-HOTFIX-MS16-037-45da2895-fcf0-4175-a533-e0fda3dbc081
  • WINDOWS-HOTFIX-MS16-037-4d0814f6-9f22-43aa-b23c-f6243b1e1f4a
  • WINDOWS-HOTFIX-MS16-045-24c736dd-5445-4c54-855b-4db161bd750d
  • WINDOWS-HOTFIX-MS16-045-d5bd3e67-e082-496b-9a43-28f9630039ab
  • WINDOWS-HOTFIX-MS16-045-fb24e957-2eb2-4d53-829a-3bcbbe6493ab

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;