Rapid7 Vulnerability & Exploit Database

Microsoft Windows: CVE-2017-0109: Windows Hyper-V Remote Code Execution Vulnerability

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Microsoft Windows: CVE-2017-0109: Windows Hyper-V Remote Code Execution Vulnerability

Severity
7
CVSS
(AV:A/AC:M/Au:S/C:C/I:C/A:C)
Published
03/14/2017
Created
07/25/2018
Added
03/14/2017
Modified
06/10/2024

Description

Hyper-V in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows guest OS users to execute arbitrary code on the host OS via a crafted application, aka "Hyper-V Remote Code Execution Vulnerability." This vulnerability is different from that described in CVE-2017-0075.

Solution(s)

  • microsoft-windows-windows_10-1507-kb4012606
  • microsoft-windows-windows_10-1511-kb4013198
  • microsoft-windows-windows_10-1607-kb4013429
  • msft-kb3211306-20249a4f-bb0f-4c94-bf16-aab24e42cab3
  • msft-kb4012212-13c36c25-fee4-429f-933e-f93ebfbb91f5
  • msft-kb4012212-36e1591a-f6d3-44d2-aa25-540234b7eb36
  • msft-kb4012212-4ee6f09d-38d9-47ef-8ba9-dd802352b8ee
  • msft-kb4012212-652eea96-c2e8-4548-8f9a-40964e5e6a74
  • msft-kb4012212-c682d11d-fc2e-4852-9da7-c2198958bf6c
  • msft-kb4012212-fb31138f-b6a5-499c-9eb6-5b5f9fff6bfd
  • msft-kb4012213-317ca43c-7dfe-4e04-8a21-2c6c4ab4fbb9
  • msft-kb4012213-5d351df3-6efb-4b17-93e0-b0e3a5babbc3
  • msft-kb4012213-80bc2b42-a953-4096-8595-130e9a9c9fb9
  • msft-kb4012214-1949e6d5-95b0-4e90-acfb-73c9d295fbbf
  • msft-kb4012214-57dbd57f-89b2-4abb-8582-14fc17870bb8
  • msft-kb4012214-b4d71d8b-1f2d-4958-ad08-e379293d71e8
  • msft-kb4013429-74b1fe65-bd6b-4b76-a624-8674748898f2

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;