MS15-068: Vulnerabilities in Windows #HyperV Could Allow Remote Code Execution – July 14, 2015

< 1 min read

Hello Folks,

Hyper-V is the most secure hypervisor today with a very good security track record, nevertheless a few security issues that did arise over the years that have always been addressed quickly.

Microsoft just released a new critical security update to address a vulnerability in Windows Hyper-V that could allow remote code execution (3072000).

The following articles contain additional information about this security update as it relates to individual product versions. The articles may contain known issue information.

  • 3046359 MS15-068: Description of the security update for Windows Hyper-V: July 14, 2015
  • 3046339 MS15-068: Description of the security update for Windows Hyper-V: July 14, 2015

This security update is rated Critical for Windows Hyper-V on Windows Server 2008, Windows Server 2008 R2, Windows 8 and Windows Server 2012, and Windows 8.1 and Windows Server 2012 R2.

The security update addresses the vulnerabilities by correcting how Hyper-V initializes system data structures in guest virtual machines.

For more information about this update, see Microsoft Knowledge Base Article 3072000.

Please secure and update your environment effectively now.

Cheers,
/Charbel

About Charbel Nemnom 579 Articles
Charbel Nemnom is a Cloud Architect, Swiss Certified ICT Security Expert, Microsoft Most Valuable Professional (MVP), and Microsoft Certified Trainer (MCT), totally fan of the latest's IT platform solutions, accomplished hands-on technical professional with over 17 years of broad IT Infrastructure experience serving on and guiding technical teams to optimize the performance of mission-critical enterprise systems. Excellent communicator is adept at identifying business needs and bridging the gap between functional groups and technology to foster targeted and innovative IT project development. Well respected by peers through demonstrating passion for technology and performance improvement. Extensive practical knowledge of complex systems builds, network design, business continuity, and cloud security.

Be the first to comment

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.