Improper restriction of communication channel to intended endpoints in Windows Hyper-V allows an authorized attacker to execute code locally.
The product establishes a communication channel to (or from) an endpoint for privileged or protected operations, but it does not properly ensure that it is communicating with the correct endpoint.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Windows_10_1607 | Microsoft | * | 10.0.14393.8246 (excluding) |
Windows_10_1809 | Microsoft | * | 10.0.17763.7558 (excluding) |
Windows_10_21h2 | Microsoft | * | 10.0.19044.6093 (excluding) |
Windows_10_22h2 | Microsoft | * | 10.0.19045.6093 (excluding) |
Windows_11_22h2 | Microsoft | * | 10.0.22621.5624 (excluding) |
Windows_11_23h2 | Microsoft | * | 10.0.22631.5624 (excluding) |
Windows_11_24h2 | Microsoft | * | 10.0.26100.4652 (excluding) |
Windows_server_2016 | Microsoft | * | 10.0.14393.8246 (excluding) |
Windows_server_2019 | Microsoft | * | 10.0.17763.7558 (excluding) |
Windows_server_2022 | Microsoft | * | 10.0.20348.3932 (excluding) |
Windows_server_2022_23h2 | Microsoft | * | 10.0.25398.1732 (excluding) |
Windows_server_2025 | Microsoft | * | 10.0.26100.4652 (excluding) |
Attackers might be able to spoof the intended endpoint from a different system or process, thus gaining the same level of access as the intended endpoint. While this issue frequently involves authentication between network-based clients and servers, other types of communication channels and endpoints can have this weakness.