MSRC compact vulnerability detail

CVE-2025-49751 · Windows Hyper-V Denial of Service Vulnerability

Missing synchronization in Windows Hyper-V allows an authorized attacker to deny service over an adjacent network.

Severity
Important
Impact
Denial of Service
CVSS
6.8 base · 5.9 temporal
Release
2025-08-12
Signals
Role: Windows Hyper-V Denial of Service Exploited: No Publicly disclosed: No Exploitability: Exploitation Less Likely
CWE
Patch Diff
Loading module diff metadata...
Resolved binary override
Use this when the MSRC module name cannot be mapped automatically or the resolved binary looks wrong.
Old version New version
Description
Missing synchronization in Windows Hyper-V allows an authorized attacker to deny service over an adjacent network.
FAQ / Articles
Windows Hyper-V Denial of Service Vulnerability
Missing synchronization in Windows Hyper-V allows an authorized attacker to deny service over an adjacent network.
FAQ
According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? In this case, a successful attack could be performed from a low privilege Hyper-V guest. The attacker could traverse the guest's security boundary to cause denial of service on the Hyper-V host environment.
Windows Hyper-V Denial of Service Vulnerability
Missing synchronization in Windows Hyper-V allows an authorized attacker to deny service over an adjacent network.
FAQ
According to the CVSS metric, the Hyper-V attack vector is adjacent (AV:A). What does that mean for this vulnerability? Where the attack vector metric is Adjacent (A), this represents virtual machines connected via a Hyper-V Network Virtualization (HNV) logical network. This configuration forms an isolation boundary where the virtual machines within the virtual network can only communicate with each other. In this attack vector, the vulnerable component is bound to the network stack, but the attack is limited to systems configured to use the HNV network.