But, fixed it one they realized the same flaw could be used to target its Hyper-V virtualization software in Windows 10 and Azure.
The patch came after Itkin discovered an attacker could use the flaw in Microsoft's RDP client for a sandbox escape or a "guest-to-host" virtual machine (VM) escape in Microsoft's Hyper-V Manager
Microsoft security software engineer Dana Baril and Itkin detail the connection between the RDP client and Hyper-V in an aptly titled presentation at Black Hat on Wednesday, called 'He Said, She Said – Poisoned RDP Offense and Defense'.
https://www.zdnet.com/article/windows-10-security-microsoft-dismissed-rdp-flaw-until-it-saw-hyper-v-was-affected/
No comments:
Post a Comment