"Researchers Publish Details on Recent Critical Hyper-V Vulnerability"

Security researchers at Guardicore Labs have shared details of a critical vulnerability in Hyper-V, tracked as CVE-2021-28476, with a CVSS score of 9.9. The vulnerability impacts Hyper-V's virtual network switch driver (vmswitch.sys). If exploited by malicious threat actors, it can lead to a denial-of-service (DoS) condition and remote code execution. Hyper-V provides virtualization capabilities for both desktop and cloud systems. Microsoft uses Hyper-V as the underlying virtualization technology for Azure. According to the researchers, the vulnerability affects Windows 7, 8.1, and 10, as well as Windows Server 2008, 2012, 2016, and 2019. This article continues to discuss the potential exploitation and impact of the critical vulnerability found in Hyper-V.

Security Week reports "Researchers Publish Details on Recent Critical Hyper-V Vulnerability"

Submitted by Anonymous on