A critical* Microsoft Windows Hyper-V Remote Code Execution Vulnerability with a CVSS 3.1 score of 9.0 was released.
A critical* Microsoft Windows Hyper-V Remote Code Execution Vulnerability with a CVSS 3.1 score of 9.0 was released. Even though no exploit regarding this vulnerability has been discovered, due to its severity/criticality, it is highly recommended that the following patches are downloaded to ensure the safety of systems/assets.
Affected Systems
It is stated in the recommended solutions section.
IoC’s
-
Recommended Solution(s)
Organizations using the following products are recommended to download the patches in the table below.
Product | Article | Patch |
---|---|---|
Windows 11 for x64-based Systems | 5006674 | Security Update |
Windows Server 2022 (Server Core installation) | 5006699 | Security Update |
Windows Server 2022 | 5006699 | Security Update |
CVE / CWE
CVE-2021-38672
Related Website(s)
* Vulnerabilities with a CVSS 3.1 score between 7.0 and 8.9 are evaluated to be “high” whereas vulnerabilities with a CVSS 3.1 score between 9.0 and 10.0 are evaluated to be “critical”.
+90 216 504 53 32
Aydınevler Mahallesi,İsmet İnönü Cadddesi,Küçükyalı Ofis Park A Blok,No:20/1 Maltepe İstanbul
+90 312 235 44 51
You can register to our newsletter on the home page to be instantly informed about security vulnerabilities.