Rapid7 Vulnerability & Exploit Database

Microsoft CVE-2020-0617: Hyper-V Denial of Service Vulnerability

Back to Search

Microsoft CVE-2020-0617: Hyper-V Denial of Service Vulnerability

Severity
5
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:C)
Published
01/14/2020
Created
01/15/2020
Added
01/14/2020
Modified
11/18/2021

Description

A denial of service vulnerability exists when Microsoft Hyper-V Virtual PCI on a host server fails to properly validate input from a privileged user on a guest operating system. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application that causes a host machine to crash. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application. The security update addresses the vulnerability by properly validating input.

Solution(s)

  • msft-kb4534271-46de78a6-89c2-4adc-a827-d55e913ca853
  • msft-kb4534271-5778b2b9-7a93-4e8d-962f-ba6868611cd6
  • msft-kb4534271-94964c8f-2416-449c-a80e-207c0399ac6d
  • msft-kb4534273-1fc77237-e468-44bc-8e45-6e9c71db435f
  • msft-kb4534273-21037827-2824-4ffc-b51a-e9529f95add9
  • msft-kb4534273-6d10f5d9-bc82-4742-8ce3-6589ecdae601
  • msft-kb4534276-4324ac04-5bcf-4bf7-a79e-c68ced90d0e4
  • msft-kb4534276-a84fe9a9-c446-447d-8830-7dc36dbf31e1
  • msft-kb4534293-0ced42ab-867a-446a-855a-94e08338eee0
  • msft-kb4534293-1ea91d13-ca0b-4fba-9d4c-a453eb7db8fe
  • msft-kb4534293-cfac930f-4c55-4444-acbb-66f6812d4b2a
  • msft-kb4534306-54c34017-623d-43f3-9191-ff2746036ea7
  • msft-kb4534306-6aa03ae1-4902-47f6-9d4c-eb6cbc3cc413

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;