CVE-2025-47999
vulnerability analysis and mitigation

Overview

A vulnerability identified as CVE-2025-47999 was discovered in Windows Hyper-V, which was disclosed on July 8, 2025. The vulnerability affects multiple versions of Microsoft Windows Server and Windows desktop operating systems, including Windows Server 2016 through 2025, and Windows 10 and 11 versions (NVD CVE).

Technical details

The vulnerability is characterized as a missing synchronization issue in Windows Hyper-V (CWE-820). Microsoft has assigned it a CVSS v3.1 base score of 6.8 (MEDIUM) with the vector string CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H, indicating adjacent network attack vector, low attack complexity, low privileges required, no user interaction needed, and high availability impact (NVD CVE).

Impact

The vulnerability can result in denial of service when successfully exploited over an adjacent network. The impact is primarily focused on system availability, with no direct effect on confidentiality or integrity (NVD CVE).

Mitigation and workarounds

Microsoft has released security updates for affected systems including Windows Server 2016 through 2025, Windows 10 versions 1607 through 22H2, and Windows 11 versions 22H2 through 24H2. Users should update to the following versions: Windows Server 2025 (10.0.26100.4652), Windows 11 22H2 (10.0.22621.5624), Windows 11 23H2 (10.0.22631.5624), and Windows 11 24H2 (10.0.26100.4652) (NVD CVE).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management