KB5041773: Windows Server 2016 Security Update (August 2024)
A crafted network packet to the Windows Network Virtualization layer can give an attacker code execution on the Hyper-V host's networking stack.
An attacker who has any code execution inside a Hyper-V guest VM can deliver crafted network traffic to the Network Virtualization layer and overflow a heap buffer in the host's networking stack, executing code on the host. Same threat model as CVE-2024-38159 (a use-after-free in the same layer): one compromised guest reaches into the host networking stack and from there can pivot to other guests on the same hypervisor.
Companion to CVE-2024-38159 in the same Network Virtualization layer — a heap-based buffer overflow rather than a use-after-free. Crafted network traffic overflows the heap and lets the attacker execute code in the host's networking stack.
Probably yes if any of these apply:
Affected OS versions
Same scenario as CVE-2024-38159 — multi-tenant Hyper-V host, compromised tenant pivots through the virtualisation layer to the host networking stack. Both CVEs patched together; install both.
Manual download
For air-gapped servers or out-of-band deployment. Microsoft Update Catalog returns every OS-version variant of this update.
↗ Microsoft Update CatalogKB5041773Manual remediation steps
Prerequisites
Estimated time
20–40 minutes per server (download + install + reboot)
Reboot required
Yes — install the cumulative update and reboot the server before the fix is active.
Steps
1. Confirm the server is missing the patch
Get-HotFix -Id KB5041773 -ErrorAction SilentlyContinue
2. Install the update — pick one channel
Windows Update / WSUS (preferred):
UsoClient ScanInstallWait
Manual download (offline / air-gapped):
3. Reboot
Restart-Computer -Force
Verification
Get-HotFix -Id KB5041773
[System.Environment]::OSVersion.Version
Rollback
wusa.exe /uninstall /kb:5041773 /quiet /norestart
Notes
No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.