CVE-2022-21995: Windows Hyper-V Remote Code Execution Vulnerability
Overview
- Severity
- High (CVSS 7.9)
- CVSS Vector
- CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
- Category
- Remote Code Execution
- Exploit Status
- Not Exploited
- Exploitation Likelihood
- Less Likely
- Patch Tuesday
- 2022-Feb
- Released
- 2022-02-08
- EPSS Score
- 0.84% (percentile: 74.7%)
FAQ
According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?
In this case, a successful attack could be performed from a low privilege Hyper-V guest. The attacker could traverse the guest's security boundary to execute code on the Hyper-V host execution environment.
According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability.
Affected Products (14)
Windows
- Windows 10 Version 1809 for x64-based Systems
- Windows Server 2019
- Windows Server 2019 (Server Core installation)
- Windows 10 Version 1909 for x64-based Systems
- Windows 10 Version 21H1 for x64-based Systems
- Windows Server 2022
- Windows Server 2022 (Server Core installation)
- Windows Server, version 20H2 (Server Core Installation)
- Windows 11 version 21H2 for x64-based Systems
- Windows 10 Version 21H2 for x64-based Systems
- Windows 10 for x64-based Systems
- Windows 10 Version 1607 for x64-based Systems
- Windows Server 2016
- Windows Server 2016 (Server Core installation)
Security Updates (7)
Acknowledgments
<a href="https://twitter.com/rezer0dai">rezer0dai</a> with EatingFigs ENooPig
Revision History
- 2022-02-08: Information published.