CVE-2026-21248
HIGHCVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Lifecycle Timeline
2Tags
Description
Heap-based buffer overflow in Windows Hyper-V allows an authorized attacker to execute code locally.
Analysis
Heap overflow in Windows Hyper-V enables authenticated local users to achieve arbitrary code execution with high privileges on affected Windows and Windows Server systems. An attacker with local access and user-level permissions can trigger memory corruption through user interaction to compromise system integrity and confidentiality. …
Sign in for full analysis, threat intelligence, and remediation guidance.
Remediation
Within 24 hours: Inventory all Windows Hyper-V deployments and identify systems with untrusted user access; disable guest VM access for non-essential accounts. Within 7 days: Implement strict role-based access controls limiting Hyper-V administrative privileges, enable Enhanced Session Mode restrictions, and segment Hyper-V hosts from general user networks. …
Sign in for detailed remediation steps.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today