Microsoft Windows Hyper-V Remote Code Execution Vulnerability

Microsoft Windows Hyper-V Remote Code Execution Vulnerability

A critical* Microsoft Windows Hyper-V Remote Code Execution Vulnerability with a CVSS 3.1 score of 9.0 was released.

Microsoft Windows Hyper-V Remote Code Execution Vulnerability-40461

A critical* Microsoft Windows Hyper-V Remote Code Execution Vulnerability with a CVSS 3.1 score of 9.0 was released. Even though no exploit regarding this vulnerability has been discovered, due to its severity/criticality, it is highly recommended that the following patches are downloaded to ensure the safety of systems/assets.

Affected Systems

It is stated in the recommended solutions section.

IoC’s

-

Recommended Solution(s)

Organizations using the following products are recommended to download the patches in the table below.

Product Article Patch
Windows 11 for x64-based Systems 5006674 Security Update
Windows Server, version 20H2 (Server Core Installation) 5006670 Security Update
Windows 10 Version 20H2 for x64-based Systems 5006670 Security Update
Windows Server, version 2004 (Server Core installation) 5006670 Security Update
Windows 10 Version 2004 for x64-based Systems 5006670 Security Update
Windows Server 2022 (Server Core installation) 5006699 Security Update
Windows Server 2022 5006699 Security Update
Windows 10 Version 21H1 for x64-based Systems 5006670 Security Update
Windows 10 Version 1909 for x64-based Systems 5006667 Security Update
Windows Server 2019 (Server Core installation) 5006672 Security Update
Windows Server 2019 5006672 Security Update
Windows 10 Version 1809 for x64-based Systems 5006672 Security Update

CVE / CWE

CVE-2021-38672

Related Website(s)

* Vulnerabilities with a CVSS 3.1 score between 7.0 and 8.9 are evaluated to be “high” whereas vulnerabilities with a CVSS 3.1 score between 9.0 and 10.0 are evaluated to be “critical”.