Vulnerability Description
A remote code execution vulnerability exists when Windows Hyper-V Network Switch running on a Windows 10, Windows 8.1, Windows Server 2012 R2, or Windows Server 2016 host server fails to properly validate input from an authenticated user on a guest operating system, aka "Hyper-V Remote Code Execution Vulnerability." This CVE ID is unique from CVE-2017-0163, CVE-2017-0180, and CVE-2017-0181.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Windows 10 | All versions |
| Microsoft | Windows 8.1 | All versions |
| Microsoft | Windows Server 2012 | r2 |
| Microsoft | Windows Server 2016 | All versions |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/97461Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1038233
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0162MitigationPatchVendor Advisory
- http://www.securityfocus.com/bid/97461Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1038233
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0162MitigationPatchVendor Advisory
FAQ
What is CVE-2017-0162?
CVE-2017-0162 is a vulnerability with a CVSS score of 7.6 (HIGH). A remote code execution vulnerability exists when Windows Hyper-V Network Switch running on a Windows 10, Windows 8.1, Windows Server 2012 R2, or Windows Server 2016 host server fails to properly vali...
How severe is CVE-2017-0162?
CVE-2017-0162 has been rated HIGH with a CVSS base score of 7.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-0162?
Check the references section above for vendor advisories and patch information. Affected products include: Microsoft Windows 10, Microsoft Windows 8.1, Microsoft Windows Server 2012, Microsoft Windows Server 2016.