An exploit has now emerged for a weak point in the Hyper-V virtualization solution. Microsoft had classified the security problem as uncritical as there was no evidence that the vulnerability was being exploited. That is changing now.
Günter Born reports on his blog. A security update for the “Hyper-V Remote Code Execution Vulnerability – CVE-2021-2847” was released on May Patch Day. A proof-of-concept for the vulnerability was published on Github. This enabled the security researcher Axel Souchet to exploit the error. The newer Windows 10 versions 2004 and 20H2 and their server variants are affected. Souchet showed the exploit on Twitter and made further information available on Github.
To explain what is triggered by the vulnerability, Microsoft has added to the FAQ on the reported security vulnerability and writes :
Administrators should act accordingly to address the remote code execution vulnerability. The exploit shows how manipulated files could otherwise take over the host system via Hyper-V virtualization. Windows Remote Management (WinRM) and Web Services on Devices (WSDAPI) are also affected by the problem. As far as is known, there is no active exploitation of the security hole (yet).
Digital marketing enthusiast and industry professional in Digital technologies, Technology News, Mobile phones, software, gadgets with vast experience in the tech industry, I have a keen interest in technology, News breaking.