8
CVE-2024-30092
- EPSS 0.44%
- Published 08.10.2024 18:15:05
- Last modified 10.01.2025 15:24:32
- Source secure@microsoft.com
- Teams watchlist Login
- Open Login
Windows Hyper-V Remote Code Execution Vulnerability
Data is provided by the National Vulnerability Database (NVD)
Microsoft ≫ Windows 10 1507 HwPlatformx64 Version < 10.0.10240.20796
Microsoft ≫ Windows 10 1607 HwPlatformx64 Version < 10.0.14393.7428
Microsoft ≫ Windows 10 1809 HwPlatformx64 Version < 10.0.17763.6414
Microsoft ≫ Windows 10 21h2 HwPlatformx64 Version < 10.0.19044.5011
Microsoft ≫ Windows 10 22h2 HwPlatformx64 Version < 10.0.19045.5011
Microsoft ≫ Windows 11 22h2 Version < 10.0.22621.4317
Microsoft ≫ Windows 11 23h2 Version < 10.0.22631.4317
Microsoft ≫ Windows 11 24h2 Version < 10.0.26100.2033
Microsoft ≫ Windows Server 2016 Version < 10.0.14393.7428
Microsoft ≫ Windows Server 2019 Version < 10.0.17763.6414
Microsoft ≫ Windows Server 2022 Version < 10.0.20348.2762
Microsoft ≫ Windows Server 2022 23h2 Version < 10.0.25398.1189
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.44% | 0.623 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 1.6 | 5.9 |
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
|
secure@microsoft.com | 8 | 1.3 | 6 |
CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
CWE-829 Inclusion of Functionality from Untrusted Control Sphere
The product imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere.