CVE-2024-43567

7.5 HIGH

📋 TL;DR

This vulnerability in Windows Hyper-V allows an authenticated attacker on a guest virtual machine to cause a denial of service condition on the Hyper-V host. It affects systems running Hyper-V with vulnerable Windows versions. The attacker needs local access to a guest VM to exploit this.

💻 Affected Systems

Products:
  • Windows Hyper-V
Versions: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Hyper-V enabled and running guest VMs

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete host system crash requiring physical reboot, disrupting all VMs and services running on that host

🟠

Likely Case

Temporary host instability causing service interruptions for some VMs until host recovers

🟢

If Mitigated

Limited impact to specific VM or minimal performance degradation if proper isolation controls are in place

🌐 Internet-Facing: LOW - Requires authenticated access to a guest VM, not directly exploitable from internet
🏢 Internal Only: MEDIUM - Malicious insider or compromised guest VM could disrupt host operations

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access to guest VM and knowledge of specific triggering conditions

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Microsoft Security Update Guide for specific KB numbers

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43567

Restart Required: Yes

Instructions:

1. Apply latest Windows security updates from Microsoft
2. Install Hyper-V specific patches if available
3. Restart Hyper-V host after patching
4. Verify patch installation with Get-HotFix command

🔧 Temporary Workarounds

Disable Hyper-V

windows

Completely disable Hyper-V role if not required

Disable-WindowsOptionalFeature -Online -FeatureName Microsoft-Hyper-V-All

Restrict Guest VM Permissions

all

Limit administrative access and capabilities within guest VMs

🧯 If You Can't Patch

  • Isolate Hyper-V hosts on separate network segments
  • Implement strict access controls and monitoring for guest VM administrative activities

🔍 How to Verify

Check if Vulnerable:

Check Windows version and Hyper-V status: Get-WindowsFeature -Name Hyper-V

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify security update installation: Get-HotFix | Where-Object {$_.HotFixID -match 'KB' + relevant KB number}

📡 Detection & Monitoring

Log Indicators:

  • Hyper-V host crash events in System logs
  • Unexpected VM shutdowns or restarts
  • Hyper-V service failures

Network Indicators:

  • Sudden loss of connectivity to multiple VMs on same host
  • Unusual guest VM to host communication patterns

SIEM Query:

EventID=41 OR EventID=6008 OR Source='Hyper-V-Hypervisor' AND (Level=1 OR Level=2)

🔗 References

📤 Share & Export