PT-2025-1057 · Microsoft · Windows Hyper-V Nt Kernel Integration Vsp+1

Oruga

·

Published

2025-01-14

·

Updated

2026-05-05

·

CVE-2025-21333

CVSS v3.1

7.8

High

VectorAV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions Windows Hyper-V NT Kernel Integration VSP versions are affected, but specific versions are not provided in the input data.
Description The issue is related to an elevation of privilege vulnerability in Windows Hyper-V NT Kernel Integration VSP, which could allow attackers to gain full system control. It is mentioned that hackers could exploit this to elevate privileges to the SYSTEM level. There are reports of this vulnerability being exploited in real-world incidents. The estimated number of potentially affected devices worldwide is not specified. Technical details about exploitation include a heap-based buffer overflow.
Recommendations Since specific affected versions are not provided, a general recommendation cannot be accurately tailored to each version. However, for Windows Hyper-V NT Kernel Integration VSP, updating to a version that includes a fix for the elevation of privilege vulnerability is recommended. Each user should check the official Microsoft website for the latest updates and patches for their specific version of Windows Hyper-V NT Kernel Integration VSP.

Exploit

Fix

LPE

Heap Based Buffer Overflow

Weakness Enumeration

Related Identifiers

BDU:2025-00287
CVE-2025-21333

Affected Products

Windows
Windows Hyper-V Nt Kernel Integration Vsp