Description
Use after free in Windows Hyper-V allows an authorized attacker to execute code over a network.
Reserved 2025-02-26 | Published 2025-04-08 | Updated 2025-05-30 | Assigner
microsoftHIGH: 7.1CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Problem types
CWE-416: Use After Free
Product status
10.0.17763.0 before 10.0.17763.7136
affected
10.0.17763.0 before 10.0.17763.7136
affected
10.0.17763.0 before 10.0.17763.7136
affected
10.0.20348.0 before 10.0.20348.3453
affected
10.0.19044.0 before 10.0.19044.5737
affected
10.0.22621.0 before 10.0.22621.5189
affected
10.0.19045.0 before 10.0.19045.5737
affected
10.0.26100.0 before 10.0.26100.3775
affected
10.0.22631.0 before 10.0.22631.5189
affected
10.0.22631.0 before 10.0.22631.5189
affected
10.0.25398.0 before 10.0.25398.1551
affected
10.0.26100.0 before 10.0.26100.3775
affected
10.0.26100.0 before 10.0.26100.3775
affected
10.0.10240.0 before 10.0.10240.20978
affected
10.0.14393.0 before 10.0.14393.7969
affected
10.0.14393.0 before 10.0.14393.7969
affected
10.0.14393.0 before 10.0.14393.7969
affected
References
msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27491 (Windows Hyper-V Remote Code Execution Vulnerability) vendor-advisory
cve.org (CVE-2025-27491)
nvd.nist.gov (CVE-2025-27491)
Download JSON