CVSS VectorNVD

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

1
Analysis Generated
Apr 14, 2026 - 19:26 vuln.today

DescriptionNVD

Heap-based buffer overflow in Windows Hyper-V allows an unauthorized attacker to execute code locally.

AnalysisAI

Heap-based buffer overflow in Windows Hyper-V enables local code execution with high impact across Windows 10, Windows 11, and Windows Server environments. An unauthenticated attacker with local access can trigger the vulnerability through user interaction (CVSS:3.1 AV:L/AC:L/PR:N/UI:R), achieving full system compromise (C:H/I:H/A:H). …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Identify and inventory all Windows 10, Windows 11, and Windows Server systems running Hyper-V using endpoint detection tools; prioritize domain controllers and virtualization hosts. Within 7 days: Apply Microsoft's released patches to all affected versions (Windows 10 1607 through 26H1, Windows Server 2019-2025); test patches in non-production Hyper-V environments first given the system-critical nature. …

Sign in for detailed remediation steps.

Share

EUVD-2026-22380 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy