time to act fast once again and make sure you have your security & patch process act together.
Note the following:
- Microsoft has not identified any mitigating factors for this vulnerability.
- Microsoft has not identified any workarounds for this vulnerability.
This security update resolves vulnerabilities in Windows that could allow remote code execution in a host context if a specially crafted application is run by an authenticated and privileged user on a guest virtual machine that is hosted by Hyper-V. An attacker must have valid logon credentials for a guest virtual machine to exploit this vulnerability.
To learn more about the vulnerability, see Microsoft Security Bulletin MS15-068
This one is critical. So do not delay long after your smoke testing of this patch.You have some time to act but don’t wait too long:
Microsoft received information about this vulnerability through coordinated vulnerability disclosure. When this security bulletin was originally issued Microsoft had not received any information to indicate that this vulnerability had been publicly used to attack customers.
Go and secure your environment wisely and effectively now.