Microsoft recently announced a remediation process for once of the vulnerability found in HYPER-V. The identified vulnerability s per Microsoft words as follows,
“vulnerability could allow denial of service if a specially crafted packet is sent to the VMBus by an authenticated user in one of the guest virtual machines hosted by the Hyper-V server. An attacker must have valid logon credentials and be able to send specially crafted content from a guest virtual machine to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users.”
Out of the above I’ve highlighted the key things an end user need to give an attention about.
Patch has been already released and advised to apply he patch on the HYPER-V environment.