SB2022011176 - Multiple vulnerabilities in Microsoft Windows Hyper-V



SB2022011176 - Multiple vulnerabilities in Microsoft Windows Hyper-V

Published: January 11, 2022

Security Bulletin ID SB2022011176
Severity
Medium
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Adjecent network
Highest impact Code execution

Breakdown by Severity

Medium 25% Low 75%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Security features bypass (CVE-ID: CVE-2022-21905)

The vulnerability allows a remote user to bypass implemented security restrictions.

The vulnerability exists due to an error in Router Guard implementation. A remote user can bypass implemented security restrictions and influence router paths.


2) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-21901)

The vulnerability allows a remote user to escalate privileges on the system.

The vulnerability exists due to unspecified error in Hyper-V. A remote user with access to the guest OS can interact with processes of another Hyper-V guest hosted on the same Hyper-V host.


3) Security features bypass (CVE-ID: CVE-2022-21900)

The vulnerability allows a remote user to bypass implemented security restrictions.

The vulnerability exists due to unspecified error in Hyper-V, related to Router Guard. A remote authenticated user can send specially crafted input to the system and bypass implemented security restrictions.


4) Input validation error (CVE-ID: CVE-2022-21847)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input. A local user can pass specially crafted input to the application and perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.