FAQ
How could an attacker exploit this vulnerability? This vulnerability requires an authenticated attacker on a guest VM to send specially crafted file operation requests on the VM to the hardware resources on the VM.
No description was published by MSRC.