First published: Fri Mar 17 2017(Updated: )
Hyper-V in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows guest OS users to execute arbitrary code on the host OS via a crafted application, aka "Hyper-V Remote Code Execution Vulnerability." This vulnerability is different from that described in CVE-2017-0075.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Windows 10 | ||
Windows 10 | =1511 | |
Windows 10 | =1607 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows | ||
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =r2 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Vista | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-0109 has a critical severity rating as it allows arbitrary code execution on the host OS by guest OS users.
To fix CVE-2017-0109, apply the latest security updates provided by Microsoft for your affected Windows version.
CVE-2017-0109 affects various versions of Microsoft Windows including Windows Vista, 7, 8.1, 10, and several Server editions.
The impact of CVE-2017-0109 is that it allows guest OS users to execute arbitrary code on the host OS, compromising system integrity.
There have been reports indicating that CVE-2017-0109 may be exploited by attackers, making it crucial to apply the necessary patches.