Tag
#Role: Windows Hyper-V
**How could an attacker exploit this vulnerability?** An authenticated attacker could run a specially crafted application on a vulnerable Hyper-V guest to exploit this vulnerability. **What privileges could an attacker gain?** An attacker who successfully exploited this vulnerability could potentially interact with processes of another Hyper-V guest hosted on the same Hyper-V host.
*What are the vulnerable configurations of Hyper-V?* Installations of Hyper-V with GRE (Generic Routing Encapsulation) enabled.
*How could an attacker exploit this vulnerability?* For successful exploitation, this vulnerability could allow a malicious guest VM to read kernel memory in the host. To trigger this vulnerability the guest VM requires a memory allocation error to first occur on the guest VM. This bug could be used for a VM escape from guest to host.