First published: Wed Mar 14 2018(Updated: )
The Microsoft Hyper-V Network Switch in 64-bit versions of Microsoft Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows a denial of service vulnerability due to how input from a privileged user on a guest operating system is validated, aka "Hyper-V Denial of Service Vulnerability".
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 10 | ||
Microsoft Windows 10 | =1511 | |
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =1703 | |
Microsoft Windows 10 | =1709 | |
Microsoft Windows Server | =1709 | |
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Server 2008 Itanium | =r2-sp1 | |
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows Server 2012 x64 | =r2 | |
Microsoft Windows Server 2016 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0885 has a severity rating of Important.
To fix CVE-2018-0885, apply the latest security updates from Microsoft for your affected version.
CVE-2018-0885 affects Microsoft Windows Server 2008 SP2, R2 SP1, Windows Server 2012, Windows 10 versions up to 1709, and Windows Server 2016.
CVE-2018-0885 is a denial of service vulnerability.
Yes, CVE-2018-0885 can be exploited remotely by sending specially crafted input to the Hyper-V Network Switch.