First published: Tue Mar 14 2023(Updated: )
Windows Hyper-V Denial of Service Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2019 | ||
Windows 11 | =22H2 | |
Windows 11 | =22H2 | |
Windows 11 | =21H2 | |
Windows 11 | =21H2 | |
Microsoft Windows Server 2022 | ||
Microsoft Windows Server 2022 | ||
Microsoft Windows 10 | <10.0.10240.19805 | |
Microsoft Windows 10 | <10.0.14393.5786 | |
Microsoft Windows 10 | <10.0.17763.4131 | |
Microsoft Windows 10 | <10.0.19042.2728 | |
Microsoft Windows 10 | <10.0.19044.2728 | |
Microsoft Windows 10 | <10.0.19045.2728 | |
Windows 11 | <10.0.22000.1696 | |
Windows 11 | <10.0.22000.1413 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2022 | ||
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | ||
Windows 10 | =20H2 | |
Windows 10 | =1809 | |
Windows 10 | =22H2 | |
Windows 10 | =1607 | |
Windows 10 | =21H2 | |
Windows 10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-23411 has a severity rating that indicates a denial of service vulnerability in Windows Hyper-V.
To fix CVE-2023-23411, apply the latest security patches provided by Microsoft for your affected Windows version.
CVE-2023-23411 affects multiple versions including Windows Server 2022, Windows 10, Windows 11, and Windows Server 2016.
Yes, CVE-2023-23411 can potentially lead to system crashes due to its denial of service nature.
Currently, the best solution is to apply the security patch as there are no known workarounds for CVE-2023-23411.