CVE-2026-21247
HIGHCVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Lifecycle Timeline
2Tags
Description
Improper input validation in Windows Hyper-V allows an authorized attacker to execute code locally.
Analysis
Improper input validation in Windows Hyper-V allows an authorized attacker to execute code locally. [CVSS 7.3 HIGH]
Sign in for full analysis, threat intelligence, and remediation guidance.
Remediation
Within 24 hours: Identify and inventory all systems running Hyper-V, assess exposure in production environments, and establish incident response readiness. Within 7 days: Implement network segmentation to restrict local access to Hyper-V hosts, review and enforce principle of least privilege for user accounts with host-level permissions, and disable non-essential Hyper-V features if operationally feasible. …
Sign in for detailed remediation steps.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today