// For flags

CVE-2024-21431

Hypervisor-Protected Code Integrity (HVCI) Security Feature Bypass Vulnerability

Severity Score

7.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

Hypervisor-Protected Code Integrity (HVCI) Security Feature Bypass Vulnerability

Vulnerabilidad de omisión de la característica de seguridad de integridad del código protegido por hipervisor (HVCI)

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2023-12-08 CVE Reserved
  • 2024-03-12 CVE Published
  • 2024-03-13 EPSS Updated
  • 2024-08-01 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-732: Incorrect Permission Assignment for Critical Resource
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Microsoft
Search vendor "Microsoft"
Windows Server 2022
Search vendor "Microsoft" for product "Windows Server 2022"
>= 10.0.0.0 < 10.0.20348.2340
Search vendor "Microsoft" for product "Windows Server 2022" and version " >= 10.0.0.0 < 10.0.20348.2340"
en
Affected
Microsoft
Search vendor "Microsoft"
Windows Server 2022
Search vendor "Microsoft" for product "Windows Server 2022"
>= 10.0.0.0 < 10.0.20348.2333
Search vendor "Microsoft" for product "Windows Server 2022" and version " >= 10.0.0.0 < 10.0.20348.2333"
en
Affected
Microsoft
Search vendor "Microsoft"
Windows 11 Version 21H2
Search vendor "Microsoft" for product "Windows 11 Version 21H2"
>= 10.0.0.0 < 10.0.22000.2836
Search vendor "Microsoft" for product "Windows 11 Version 21H2" and version " >= 10.0.0.0 < 10.0.22000.2836"
en
Affected
Microsoft
Search vendor "Microsoft"
Windows 10 Version 21H2
Search vendor "Microsoft" for product "Windows 10 Version 21H2"
>= 10.0.0.0 < 10.0.19044.4170
Search vendor "Microsoft" for product "Windows 10 Version 21H2" and version " >= 10.0.0.0 < 10.0.19044.4170"
en
Affected
Microsoft
Search vendor "Microsoft"
Windows 11 Version 22H2
Search vendor "Microsoft" for product "Windows 11 Version 22H2"
>= 10.0.0.0 < 10.0.22621.3296
Search vendor "Microsoft" for product "Windows 11 Version 22H2" and version " >= 10.0.0.0 < 10.0.22621.3296"
en
Affected
Microsoft
Search vendor "Microsoft"
Windows 10 Version 22H2
Search vendor "Microsoft" for product "Windows 10 Version 22H2"
>= 10.0.0.0 < 10.0.19045.4170
Search vendor "Microsoft" for product "Windows 10 Version 22H2" and version " >= 10.0.0.0 < 10.0.19045.4170"
en
Affected
Microsoft
Search vendor "Microsoft"
Windows 11 Version 22H3
Search vendor "Microsoft" for product "Windows 11 Version 22H3"
>= 10.0.0.0 < 10.0.22631.3296
Search vendor "Microsoft" for product "Windows 11 Version 22H3" and version " >= 10.0.0.0 < 10.0.22631.3296"
en
Affected
Microsoft
Search vendor "Microsoft"
Windows 11 Version 23H2
Search vendor "Microsoft" for product "Windows 11 Version 23H2"
>= 10.0.0.0 < 10.0.22631.3296
Search vendor "Microsoft" for product "Windows 11 Version 23H2" and version " >= 10.0.0.0 < 10.0.22631.3296"
en
Affected
Microsoft
Search vendor "Microsoft"
Windows Server 2022, 23H2 Edition (Server Core Installation)
Search vendor "Microsoft" for product "Windows Server 2022, 23H2 Edition (Server Core Installation)"
>= 10.0.0.0 < 10.0.25398.763
Search vendor "Microsoft" for product "Windows Server 2022, 23H2 Edition (Server Core Installation)" and version " >= 10.0.0.0 < 10.0.25398.763"
en
Affected