8.4
CVSSv3

CVE-2019-0551

Published: 08/01/2019 Updated: 14/01/2019
CVSS v2 Base Score: 7.7 | Impact Score: 10 | Exploitability Score: 5.1
CVSS v3 Base Score: 8.4 | Impact Score: 6 | Exploitability Score: 1.7
VMScore: 685
Vector: AV:A/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system, aka "Windows Hyper-V Remote Code Execution Vulnerability." This affects Windows Server 2016, Windows 10, Windows Server 2019, Windows 10 Servers. This CVE ID is unique from CVE-2019-0550.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows 10 1809

microsoft windows server 2016 1709

microsoft windows 10 1607

microsoft windows 10 1703

microsoft windows 10 1709

microsoft windows server 2016 1803

microsoft windows server 2019 -

microsoft windows 10 1803

microsoft windows server 2016 -

Recent Articles

Welcome to 2019: Your Exchange server can be pwned by an email (and other bugs need fixing)
The Register • Shaun Nichols in San Francisco • 08 Jan 2019

Hyper-V, DHCP, Word, and more. Plus, bonus shock: Adobe spares Flash in January patch dump

Patch Tuesday Microsoft has released the first Patch Tuesday bundle of the year, patching up 49 CVE-listed security vulnerabilities and issuing two advisories. The January edition of Patch Tuesday includes critical fixes for Windows 10, Exchange Server, and Hyper-V. Among the 49 bug fixes were patches for remote code execution flaws in DHCP (CVE-2019-0547) and an Exchange memory corruption flaw (CVE-2019-0586) that Trend Micro ZDI researcher Dustin Childs warns is particularly dangerous as it ca...