Lucene search

K
kasperskyKaspersky LabKLA11060
HistoryApr 11, 2017 - 12:00 a.m.

KLA11060 Multiple vulnerabilities in Microsoft Windows Hyper-V

2017-04-1100:00:00
Kaspersky Lab
threats.kaspersky.com
29

7.4 High

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:A/AC:M/Au:S/C:C/I:C/A:C

7.6 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

7.4 High

AI Score

Confidence

High

0.008 Low

EPSS

Percentile

82.0%

Multiple serious vulnerabilities have been found in Microsoft Windows Hyper-V. Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code and cause a denial of service.

Below is a complete list of vulnerabilities:

  1. Multiple vulnerabilities related to an improper validation of guest operating system network traffic in Windows Hyper-V Network Switch can be exploited remotely via a specially designed application to execute arbitrary code;
  2. Multiple vulnerabilities related to an improper validation of guest operating system user input in Windows Hyper-V Network Switch can be exploited remotely via a specially designed application to obtain sensitive information;
  3. Multiple vulnerabilities related to an incorrect validation of input from a privileged user on a guest operating system can be exploited remotely via a specially designed application to cause a denial of service;
  4. Multiple vulnerabilities related to an improper handling of an access from virtual machines to the Hyper-V Network Switch can be exploited remotely via a specially designed application to cause a denial of service.

Original advisories

CVE-2017-0179

CVE-2017-0178

CVE-2017-0186

CVE-2017-0162

CVE-2017-0163

CVE-2017-0182

CVE-2017-0185

CVE-2017-0184

CVE-2017-0183

CVE-2017-0168

CVE-2017-0169

CVE-2017-0180

CVE-2017-0181

CVE-2017-0162

CVE-2017-0163

CVE-2017-0168

CVE-2017-0169

CVE-2017-0178

CVE-2017-0179

CVE-2017-0180

CVE-2017-0181

CVE-2017-0182

CVE-2017-0183

CVE-2017-0184

CVE-2017-0185

CVE-2017-0186

Related products

Microsoft-Windows-Server-2012

Microsoft-Windows-7

Microsoft-Windows-Server-2008

Windows-RT

Microsoft-Windows-10

CVE list

CVE-2017-0162 high

CVE-2017-0163 high

CVE-2017-0168 high

CVE-2017-0169 high

CVE-2017-0178 high

CVE-2017-0179 high

CVE-2017-0180 high

CVE-2017-0181 high

CVE-2017-0182 high

CVE-2017-0183 high

CVE-2017-0184 high

CVE-2017-0185 high

CVE-2017-0186 high

KB list

4015549

4015550

4015221

4015551

4015219

4015548

4015546

4015217

4015583

4015547

3217841

3211308

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

Affected Products

  • Microsoft Windows 8.1Microsoft Windows 10Microsoft Windows Server 2008 Service Pack 2Microsoft Windows Server 2008 R2 Service Pack 1Microsoft Windows Server 2012Microsoft Windows Server 2012 R2Microsoft Windows Server 2016

References

7.4 High

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:A/AC:M/Au:S/C:C/I:C/A:C

7.6 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

7.4 High

AI Score

Confidence

High

0.008 Low

EPSS

Percentile

82.0%