Rapid7 Vulnerability & Exploit Database

Microsoft CVE-2021-1692: Hyper-V Denial of Service Vulnerability

Back to Search

Microsoft CVE-2021-1692: Hyper-V Denial of Service Vulnerability

Severity
4
CVSS
(AV:N/AC:L/Au:S/C:N/I:N/A:P)
Published
01/12/2021
Created
01/13/2021
Added
01/12/2021
Modified
11/18/2021

Description

Microsoft CVE-2021-1692: Hyper-V Denial of Service Vulnerability

Solution(s)

  • msft-kb4598231-2f044af2-0ec8-4e4a-b346-28900c829291
  • msft-kb4598231-8985b47d-e928-4d6b-ae36-82f66cba3e16
  • msft-kb4598243-6e9e0208-fc41-4e59-8812-7226b1cb9929
  • msft-kb4598243-8a0b74e5-7a74-4095-91a8-f445032477ed
  • msft-kb4598243-cdfe2600-cd42-4d0b-b3bc-4fc7a8c3cf83
  • msft-kb4598275-008c503a-c7d5-4656-8275-0a74750f5770
  • msft-kb4598275-6e0d04ab-9b89-498f-8d1c-9e1542d82c0e
  • msft-kb4598275-777a6c49-c06d-4be7-b7bd-8806ac6d4d7a
  • msft-kb4601315-23e7b1ae-ad85-4624-9d4e-84687127f0c9
  • msft-kb4601315-28111d1f-0098-4a08-a336-c1f35a3cfe14
  • msft-kb4601315-2c164bd0-4316-46e2-b81a-a6bda2287ad1
  • msft-kb4601315-2e652760-fd8c-4b28-bd36-dd352402f173
  • msft-kb4601315-4f44f464-5b5f-4afc-813d-d60fc692ae6e
  • msft-kb4601319-4202746d-27d9-48c2-9568-2e4839a9c16b
  • msft-kb4601319-a3371827-e73a-421a-a821-f12fd367a878
  • msft-kb4601319-aa36287a-6bcc-46b3-844c-5952b594a12e
  • msft-kb4601319-b8d92139-b1ab-4f72-b60c-d1050fa23c5e
  • msft-kb4601319-be459d13-cf9b-4add-aae1-69a83477ae9e
  • msft-kb4601319-befb8b93-df3c-483a-bd84-63639f02ab86
  • msft-kb4601319-ca349183-c93f-401f-b2a5-c6713c01f7f1
  • msft-kb4601319-d7760b05-5068-445c-bad9-5a652a5607af
  • msft-kb4601319-e3422cab-e611-402b-b4c5-91fdf852b75b
  • msft-kb4601319-e9dc52b3-aff6-4e3e-934a-a4d425b11fde
  • msft-kb4601345-3b539fdd-420b-445d-8ce4-1ba5c85ee89c
  • msft-kb4601345-5fc2926a-6876-4bbf-b36f-3f5325701586
  • msft-kb4601345-ad2a7677-fd89-46cf-8513-54cecaf14d31
  • msft-kb4601354-a1f68f19-55c4-41f5-b056-0c74019638e9
  • msft-kb4601354-e5ce6ca5-1af3-41a1-a32f-fe24639e6e75

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;