CPU Virtualization Extensions
A recent demonstration showed how an attacker could take advantage of new processor virtualization extension instructions to install a hypervisor-based rootkit on a system that has hardware-assisted virtualization enabled and no virtualization software installed.
This article shares Microsoft's analysis of the exploitability and seriousness of this threat and recommends configuration options to increase the security of the processor virtualization extension feature.
0 comment:
Yorum Gönder