SB2024100874 - Multiple vulnerabilities in Microsoft Windows Hyper-V
Published: October 8, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Resource exhaustion (CVE-ID: CVE-2024-43575)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources in Windows Hyper-V. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
2) Incorrect Check of Function Return Value (CVE-ID: CVE-2024-43521)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect check of function return value in Windows Hyper-V. A remote attacker can perform a denial of service (DoS) attack.
3) Allocation of Resources Without Limits or Throttling (CVE-ID: CVE-2024-43567)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to allocation of resources without limits or throttling in Windows Hyper-V. A remote attacker can cause a denial of service condition on the target system.
4) Input validation error (CVE-ID: CVE-2024-20659)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to insufficient validation of user-supplied input in Windows Hyper-V. A remote attacker on the local network can bypass the UEFI, leading to the compromise of the hypervisor and the secure kernel.
5) Input validation error (CVE-ID: CVE-2024-30092)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to insufficient validation of user-supplied input in Windows Hyper-V. A remote user on the local network can pass specially crafted input to the application and execute arbitrary code on the system.
Remediation
Install update from vendor's website.
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2024-43575
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2024-43521
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2024-43567
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2024-20659
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2024-30092