9.9
CVSSv3

CVE-2021-28476

Published: 11/05/2021 Updated: 02/08/2023
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 9.9 | Impact Score: 6 | Exploitability Score: 3.1
VMScore: 580
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

Windows Hyper-V Remote Code Execution Vulnerability

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows 10 -

microsoft windows server 2008 r2

microsoft windows server 2012 r2

microsoft windows server 2016 -

microsoft windows 10 1607

microsoft windows 7 -

microsoft windows server 2012 -

microsoft windows server 2008 -

microsoft windows 8.1 -

microsoft windows 10 1803

microsoft windows server 2019 -

microsoft windows 10 1809

microsoft windows server 2016 1909

microsoft windows 10 1909

microsoft windows server 2016 2004

microsoft windows 10 2004

microsoft windows server 2016 20h2

microsoft windows 10 20h2

Github Repositories

PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys.

0vercl0k PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitchsys

PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys.

CVE-2021-28476: a guest-to-host "Microsoft Hyper-V Remote Code Execution Vulnerability" in vmswitchsys This is a proof of concept for CVE-2021-28476 ("Hyper-V Remote Code Execution Vulnerability"), an arbitrary memory read in vmswitchsys (network virtualization service provider) patched by Microsoft in May 2021 The vulnerability was found by @australeo,

CVE-2021-28476: Hyper-V vmswitch.sys arbitrary pointer dereference from guest VM

CVE-2021-28476: Hyper-V vmswitchsys arbitrary pointer dereference from guest VM Summary: A Hyper-V guest virtual machine can trigger a Denial-of-Service condition on its underlying host due to unsafe parsing of input by the VmsIfrInfoParams_OID_SWITCH_NIC_REQUEST function in vmswitchsys The crash is caused by the function attempting to dereference a guest controlled value as

CVE-2021-28476: Microsoft Hyper-V: Multiple Vulnerabilities in vmswitch Multiple bugs are present in WPP code when handling set OID requests, one of them allowing to dereference (read access) an attacker controlled pointer, and the rest causing out of bounds read accesses This repository contains the proof-of-concept code to trigger the identified issues A full technical desc

Hyper-V related resources

Hyper-V stuff This repository contains some of the Hyper-V related work I did in the past GHHv6_ch25 My code from the "Inside Hyper-V" of the Gray Hat Hacking book (6th edition) Original repository: githubcom/GrayHatHacking/GHHv6git Includes a framework that can be used to perform hypervisor research/fuzzing and hyper-v specific code (hypercalls, MSRs, V

Recent Articles

Pakistan's tax office services go dark after migration project goes awry
The Register • Simon Sharwood, APAC Editor • 17 Aug 2021

Get our weekly newsletter Local reports suggest Microsoft Hyper-V crack was the cause, as rumours swirl of data leak

Pakistan's Federal Board of Revenue – the nation's tax office – has experienced a lengthy outage after a migration project went bad, perhaps as the result of a cyber-attack. The Board (FBR) has acknowledged that an upgrade process encountered "unforeseen anomalies" that resulted in an outage to its public-facing services from the evening of August 13th. A subsequent update said only some Customs-related services went down, but local media report the problem was not of the FBR's making, and t...