Exploit - Trusted Platform Module (TPM) OOBW
How could an attacker exploit this vulnerability? By leveraging malicious TPM commands from a guest VM to a target running Hyper-V, an attacker can cause an out of bounds write in the root partition.