Tag
#Role: Windows Hyper-V
Missing synchronization in Windows Hyper-V allows an authorized attacker to deny service over an adjacent network.
**According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?** A race condition is triggered when the admin begins administering from the host system and not a guest or nested guest.
Numeric truncation error in Windows Hyper-V allows an authorized attacker to elevate privileges over a network.
**How could an attacker exploit this vulnerability?** An authenticated attacker could create a crafted vhdx file and can call the vhdmp api with vhdx as one of the arguments.
**What privileges could be gained by an attacker who successfully exploited this vulnerability?** An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Out-of-bounds read in Windows Hyper-V allows an authorized attacker to execute code over an adjacent network.
Missing synchronization in Windows Hyper-V allows an authorized attacker to deny service over an adjacent network.
Integer overflow or wraparound in Windows Hyper-V allows an authorized attacker to disclose information over an adjacent network.
Improper input validation in Windows Hyper-V allows an unauthorized attacker to deny service locally.
**What privileges could be gained by an attacker who successfully exploited this vulnerability?** An attacker who successfully exploited this vulnerability could gain Kernel Memory Access.