PT-2025-1057 · Microsoft · Windows Hyper-V Nt Kernel Integration Vsp+1
Oruga
·
Published
2025-01-14
·
Updated
2026-05-05
·
CVE-2025-21333
CVSS v3.1
7.8
High
| Vector | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Windows Hyper-V NT Kernel Integration VSP versions are affected, but specific versions are not provided in the input data.
Description
The issue is related to an elevation of privilege vulnerability in Windows Hyper-V NT Kernel Integration VSP, which could allow attackers to gain full system control. It is mentioned that hackers could exploit this to elevate privileges to the SYSTEM level. There are reports of this vulnerability being exploited in real-world incidents. The estimated number of potentially affected devices worldwide is not specified. Technical details about exploitation include a heap-based buffer overflow.
Recommendations
Since specific affected versions are not provided, a general recommendation cannot be accurately tailored to each version. However, for Windows Hyper-V NT Kernel Integration VSP, updating to a version that includes a fix for the elevation of privilege vulnerability is recommended. Each user should check the official Microsoft website for the latest updates and patches for their specific version of Windows Hyper-V NT Kernel Integration VSP.
Exploit
Fix
LPE
Heap Based Buffer Overflow
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Windows
Windows Hyper-V Nt Kernel Integration Vsp