7.7
CVSSv2

CVE-2020-0910

Published: 15/04/2020 Updated: 21/07/2021
CVSS v2 Base Score: 7.7 | Impact Score: 10 | Exploitability Score: 5.1
CVSS v3 Base Score: 8.4 | Impact Score: 6 | Exploitability Score: 1.7
VMScore: 686
Vector: AV:A/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system, aka 'Windows Hyper-V Remote Code Execution Vulnerability'.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows 10 1809

microsoft windows 10 1903

microsoft windows 10 1909

microsoft windows server 2016 1903

microsoft windows server 2016 1909

microsoft windows server 2019 -

Recent Articles

Microsoft Patch Tuesday - April 2020
Symantec Threat Intelligence Blog • Preethi Koroth • 15 Apr 2024

This month the vendor has patched 113 vulnerabilities, 18 of which are rated Critical.

Posted: 15 Apr, 202029 Min ReadThreat Intelligence SubscribeMicrosoft Patch Tuesday - April 2020This month the vendor has patched 113 vulnerabilities, 18 of which are rated Critical.As always, customers are advised to follow these security best practices: Install vendor patches as soon as they are available. Run all software with the least privileges required while still maintaining functionality. Avoid handling files from unknown or questionable ...

April 2020 and – rest assured – your Windows PC can still be pwned by something so innocuous as an unruly font
The Register • Shaun Nichols in San Francisco • 14 Apr 2020

Adobe and Intel add their woes

Microsoft has delivered another epic Patch Tuesday, dropping fixes for more than 100 security bugs, and Adobe and Intel have added their dose of misery and security too. The April edition of Patch Tuesday sees the release of fixes for 113 CVE-listed bugs. Four really important ones are already being exploited in the wild. Of those, two target font code ,another goes for an old VBScript error and the last one requires local access. "In a web-based attack scenario, an attacker could host a special...