Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6wqg-vw6j-rqfv

Опубликовано: 28 июл. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 5.4

Описание

DLL hijacking of all PE32 executables when run on Windows for ARM64 CPU architecture. This allows an attacker to execute code, if the attacker can plant a DLL in the same directory as the executable. Vulnerable versions of Windows 11 for ARM attempt to load Base DLLs that would ordinarily not be loaded from the application directory. Fixed in release 24H2, but present in all earlier versions of Windows 11 for ARM CPUs.

DLL hijacking of all PE32 executables when run on Windows for ARM64 CPU architecture. This allows an attacker to execute code, if the attacker can plant a DLL in the same directory as the executable. Vulnerable versions of Windows 11 for ARM attempt to load Base DLLs that would ordinarily not be loaded from the application directory. Fixed in release 24H2, but present in all earlier versions of Windows 11 for ARM CPUs.

EPSS

Процентиль: 3%
0.00019
Низкий

5.4 Medium

CVSS4

Дефекты

CWE-427

Связанные уязвимости

nvd
около 2 месяцев назад

DLL hijacking of all PE32 executables when run on Windows for ARM64 CPU architecture. This allows an attacker to execute code, if the attacker can plant a DLL in the same directory as the executable. Vulnerable versions of Windows 11 for ARM attempt to load Base DLLs that would ordinarily not be loaded from the application directory. Fixed in release 24H2, but present in all earlier versions of Windows 11 for ARM CPUs.

EPSS

Процентиль: 3%
0.00019
Низкий

5.4 Medium

CVSS4

Дефекты

CWE-427