Rapid7 Vulnerability & Exploit Database

Microsoft Windows: CVE-2019-0720: Hyper-V Remote Code Execution Vulnerability

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Microsoft Windows: CVE-2019-0720: Hyper-V Remote Code Execution Vulnerability

Severity
8
CVSS
(AV:A/AC:L/Au:S/C:C/I:C/A:C)
Published
08/13/2019
Created
08/14/2019
Added
08/13/2019
Modified
06/27/2024

Description

A remote code execution vulnerability exists when Windows Hyper-V Network Switch on a host server fails to properly validate input from an authenticated user on a guest operating system, aka 'Hyper-V Remote Code Execution Vulnerability'.

Solution(s)

  • microsoft-windows-windows_10-1507-kb4512497
  • microsoft-windows-windows_10-1607-kb4512517
  • microsoft-windows-windows_10-1703-kb4512507
  • microsoft-windows-windows_10-1709-kb4512516
  • microsoft-windows-windows_10-1803-kb4512501
  • microsoft-windows-windows_10-1809-kb4511553
  • msft-kb4511553-8eb289e2-ef30-46de-a545-1600b9255165
  • msft-kb4512482-5ed85e60-5ce7-4c4c-94aa-f19944914692
  • msft-kb4512482-68a99d81-d48f-4437-9515-ea4a427f4014
  • msft-kb4512482-69a5f449-ad8a-42a5-a815-014c374a7293
  • msft-kb4512486-16bba1d9-7035-4243-b78b-cea3df5096b6
  • msft-kb4512486-2d01b298-6879-4d30-8a68-e872592d343e
  • msft-kb4512486-437934f0-2915-4e74-b1cc-04921ce3aef1
  • msft-kb4512486-cb62a71d-be6d-491e-9e4d-046e3dff67e9
  • msft-kb4512486-d6348d13-661b-4391-b03d-77cbf3143cd2
  • msft-kb4512486-fc466b63-7e33-42b7-8bfe-72335a76bb07
  • msft-kb4512489-90af280c-d27d-450d-a8de-81ca67856fc0
  • msft-kb4512489-b3966674-69a0-477b-a7cf-038bf6d6bf58
  • msft-kb4512489-bfc44f53-1c17-46df-9be6-9009a1a38c70
  • msft-kb4512491-08cff48b-50a6-45e0-80f9-1e9c166f5ebd
  • msft-kb4512491-ba106612-9217-4c05-84e3-bf93da04241b
  • msft-kb4512491-d0f0c55e-5ea3-418c-a858-82f582466388
  • msft-kb4512501-5570183b-a0b7-4478-b0af-47a6e65417ca
  • msft-kb4512517-081388ab-f979-4aef-93fe-813c0044c838

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;