vulnerability
Microsoft Windows: CVE-2018-0885: Windows Hyper-V Denial of Service Vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:M/Au:S/C:N/I:N/A:C) | Mar 13, 2018 | Mar 13, 2018 | Sep 5, 2025 |
Severity
6
CVSS
(AV:N/AC:M/Au:S/C:N/I:N/A:C)
Published
Mar 13, 2018
Added
Mar 13, 2018
Modified
Sep 5, 2025
Description
The Microsoft Hyper-V Network Switch in 64-bit versions of Microsoft Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows a denial of service vulnerability due to how input from a privileged user on a guest operating system is validated, aka "Hyper-V Denial of Service Vulnerability".
Solutions
microsoft-windows-windows_10-1507-kb4088786microsoft-windows-windows_10-1511-kb4088779microsoft-windows-windows_10-1607-kb4088787microsoft-windows-windows_10-1703-kb4088782microsoft-windows-windows_10-1709-kb4088776microsoft-windows-windows_server_2012-kb4088880microsoft-windows-windows_server_2012_r2-kb4088879microsoft-windows-windows_server_2016-1607-kb4088787msft-kb4073011-f5fa7f56-0539-4320-950c-7af1710dccbamsft-kb4088878-3eccb222-8147-418c-b824-32e3963b52c1msft-kb4088878-ce7acebc-806a-4eee-b8b5-49b0519d888amsft-kb4088878-db255014-1ec8-426a-ab12-20e28bec0d24msft-kb4088879-ebcd1310-7b09-4c4a-9782-1b7e7c242dfdmsft-kb4088880-4af681cd-8e85-46e0-810c-ef55910f3037msft-kb4088880-885d494a-b0e4-442b-8540-30de0cf6feba
References
- BID-103261
- CVE-2018-0885
- https://attackerkb.com/topics/CVE-2018-0885
- CWE-20
- URL-https://support.microsoft.com/help/4088776
- URL-https://support.microsoft.com/help/4088779
- URL-https://support.microsoft.com/help/4088782
- URL-https://support.microsoft.com/help/4088786
- URL-https://support.microsoft.com/help/4088787
- URL-https://support.microsoft.com/help/4088879
- URL-https://support.microsoft.com/help/4088880
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.