CVE-2019-0713
Published Jun 12, 2019
Last updated 5 years ago
Overview
- Description
- A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate input from a privileged user on a guest operating system, aka 'Windows Hyper-V Denial of Service Vulnerability'. This CVE ID is unique from CVE-2019-0710, CVE-2019-0711.
- Source
- secure@microsoft.com
- NVD status
- Analyzed
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 4
- Exploitability score
- 2.3
- Vector string
- CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 5.5
- Impact score
- 6.9
- Exploitability score
- 5.1
- Vector string
- AV:A/AC:L/Au:S/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- CWE-20
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "084984D5-D241-497B-B118-50C6C1EAD468" }, { "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "897A48D7-FCA1-4560-AFBB-718AF19BA3A2" }, { "criteria": "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "2704BDB7-C9DC-42A6-925D-798568E22D6D" }, { "criteria": "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "1B3308A0-1699-4A4A-8D6B-AB4E4C825C95" }, { "criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "1981BA0D-0920-40C0-8A6A-5D5A1B221560" }, { "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "6CF580BA-6938-40F6-9D86-F43044A6BACA" }, { "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "7FE8B00B-4F39-4755-A323-8AD71F5E3EBE" }, { "criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "C936FD4F-959C-43B8-9917-E2A0DF4A8793" }, { "criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:itanium:*", "vulnerable": true, "matchCriteriaId": "FFFD8C6B-7A46-484C-8701-81D58AB1C2CF" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "vulnerable": true, "matchCriteriaId": "B320A104-9037-487E-BC9A-62B4A6B49FD0" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CAACE735-003E-4ACB-A82E-C0CF97D7F013" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" } ], "operator": "OR" } ] } ]