vulnerability
Microsoft Windows: CVE-2017-0109: Windows Hyper-V Remote Code Execution Vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:A/AC:M/Au:S/C:C/I:C/A:C) | Mar 14, 2017 | Mar 14, 2017 | Sep 5, 2025 |
Severity
7
CVSS
(AV:A/AC:M/Au:S/C:C/I:C/A:C)
Published
Mar 14, 2017
Added
Mar 14, 2017
Modified
Sep 5, 2025
Description
Hyper-V in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows guest OS users to execute arbitrary code on the host OS via a crafted application, aka "Hyper-V Remote Code Execution Vulnerability." This vulnerability is different from that described in CVE-2017-0075.
Solutions
microsoft-windows-windows_10-1507-kb4012606microsoft-windows-windows_10-1511-kb4013198microsoft-windows-windows_10-1607-kb4013429microsoft-windows-windows_server_2012-kb4012214microsoft-windows-windows_server_2012_r2-kb4012213microsoft-windows-windows_server_2016-1607-kb4013429msft-kb3211306-20249a4f-bb0f-4c94-bf16-aab24e42cab3msft-kb4012212-13c36c25-fee4-429f-933e-f93ebfbb91f5msft-kb4012212-36e1591a-f6d3-44d2-aa25-540234b7eb36msft-kb4012212-4ee6f09d-38d9-47ef-8ba9-dd802352b8eemsft-kb4012212-652eea96-c2e8-4548-8f9a-40964e5e6a74msft-kb4012212-c682d11d-fc2e-4852-9da7-c2198958bf6cmsft-kb4012212-fb31138f-b6a5-499c-9eb6-5b5f9fff6bfdmsft-kb4012213-317ca43c-7dfe-4e04-8a21-2c6c4ab4fbb9msft-kb4012213-5d351df3-6efb-4b17-93e0-b0e3a5babbc3msft-kb4012214-1949e6d5-95b0-4e90-acfb-73c9d295fbbfmsft-kb4012214-b4d71d8b-1f2d-4958-ad08-e379293d71e8
References
- BID-96644
- CVE-2017-0109
- https://attackerkb.com/topics/CVE-2017-0109
- CWE-20
- URL-https://support.microsoft.com/help/4012213
- URL-https://support.microsoft.com/help/4012214
- URL-https://support.microsoft.com/help/4012606
- URL-https://support.microsoft.com/help/4013198
- URL-https://support.microsoft.com/help/4013429
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.