First published: Tue Dec 10 2024(Updated: )
Windows Hyper-V Remote Code Execution Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server 2025 | ||
Microsoft Windows Server 2025 | ||
Microsoft Windows Server 2022 23H2 | ||
Windows 11 | =23H2 | |
Windows 11 | =22H2 | |
Windows 11 | =22H2 | |
Windows 11 | =24H2 | |
Windows 11 | =24H2 | |
Windows 11 | =23H2 | |
Windows 11 | <10.0.22621.4602 | |
Windows 11 | <10.0.22631.4602 | |
Windows 11 | <10.0.26100.2605 | |
Microsoft Windows Server 2022 | <10.0.20348.2966 | |
Microsoft Windows Server 2022 | <10.0.25398.1308 | |
Microsoft Windows Server 2025 | <10.0.26100.2605 | |
Microsoft Windows Server 2022 | ||
Microsoft Windows Server 2022 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-49117 is classified as a critical remote code execution vulnerability in Windows Hyper-V.
To fix CVE-2024-49117, users should apply the latest security updates provided by Microsoft for their affected systems.
CVE-2024-49117 affects multiple versions of Microsoft Windows 11 and Windows Server 2022, as well as future releases like Windows Server 2025.
As of now, there is no public indication that CVE-2024-49117 is being actively exploited in the wild.
Attackers may exploit CVE-2024-49117 by executing arbitrary code on vulnerable Hyper-V hosts resulting in complete system compromise.