CVE-2019-0720

Summary

A remote code execution vulnerability exists when Windows Hyper-V Network Switch on a host server fails to properly validate input from an authenticated user on a guest operating system, aka 'Hyper-V Remote Code Execution Vulnerability'.

Technical Details

CVSSv3 Severity:

High

CVSSv2 Score:

7.7

CVSSv3 Score:

8.4

CWE ID:

CWE-20

Published Date:

Wednesday 14th of August 2019

Modified Date:

Tuesday 20th of August 2019

CVSSv2 Score:
  • Access Vector: Adjacent_network
  • Access Complexity: Low
  • Authentication Required: Single
  • Confidentiality Impact: Complete
  • Integrity Impact: Complete
  • Availability Impact: Complete
CVSSv3 Score:
  • Attack Vector: Adjacent_network
  • Attack Complexity: Low
  • Privileges Required: High
  • User Interaction: None
  • Scope: Changed
  • Confidentiality Impact: High
  • Integrity Impact: High
  • Availability Impact: High
Common Platform Enumeration (CPE) Affected: Common Platform Enumeration (CPE) List:

Reference: Find your Vulnerabilities:

Find out if you have vulnerabilities exposing you to hackers and malware: Download Mageni's Free Edition

Keyword Search

Search CVEs, Products and Vendors.

Don't pay for a vulnerability scanning and management platform. This one is free.

Mageni provides a free vulnerability scanning and management platform which helps you need to find, prioritize, remediate and manage your vulnerabilities.