CVSS VectorNVD
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Lifecycle Timeline
1DescriptionNVD
Heap-based buffer overflow in Windows Hyper-V allows an unauthorized attacker to execute code locally.
AnalysisAI
Heap-based buffer overflow in Windows Hyper-V enables local code execution with high impact across Windows 10, Windows 11, and Windows Server environments. An unauthenticated attacker with local access can trigger the vulnerability through user interaction (CVSS:3.1 AV:L/AC:L/PR:N/UI:R), achieving full system compromise (C:H/I:H/A:H). …
Sign in for full analysis, threat intelligence, and remediation guidance.
RemediationAI
Within 24 hours: Identify and inventory all Windows 10, Windows 11, and Windows Server systems running Hyper-V using endpoint detection tools; prioritize domain controllers and virtualization hosts. Within 7 days: Apply Microsoft's released patches to all affected versions (Windows 10 1607 through 26H1, Windows Server 2019-2025); test patches in non-production Hyper-V environments first given the system-critical nature. …
Sign in for detailed remediation steps.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2026-22380
GHSA-xgrj-5fxr-f35m