A privilege elevation vulnerability exists in Hyper-V due to improper verification of the memory addresses of the data structure. An authenticated attacker could exploit this vulnerability by sending a specially crafted function parameter in a hypercall to the host hypervisor resulting in execution of arbitrary code as System in another virtual machine (VM) on the shared Hyper-V host.
Successful exploitation of this vulnerability could render the Hyper-V unresponsive on the same platforms, allowing an attacker to cause the Hyper-V host to stop responding or restart.
The information provided herein is on "as is" basis, without warranty of any kind.