Описание
Internet Explorer Security Feature Bypass Vulnerability
A security feature bypass vulnerability exists when Internet Explorer fails to validate User Mode Code Integrity (UMCI) policies. The vulnerability could allow an attacker to bypass Device Guard UMCI policies.
To exploit the vulnerability, a user could either visit a malicious website or an attacker with access to the system could run a specially crafted application. An attacker could then leverage the vulnerability to run unsigned malicious code as though it were signed by a trusted source.
The update addresses the vulnerability by correcting how Internet Explorer validates UMCI policies.
Обновления
Продукт | Статья | Обновление |
---|---|---|
Internet Explorer 11 on Windows Server 2016 | ||
Internet Explorer 11 on Windows 10 for 32-bit Systems | ||
Internet Explorer 11 on Windows 10 for x64-based Systems | ||
Internet Explorer 11 on Windows 10 Version 1511 for 32-bit Systems | ||
Internet Explorer 11 on Windows 10 Version 1511 for x64-based Systems | ||
Internet Explorer 11 on Windows 10 Version 1607 for 32-bit Systems | ||
Internet Explorer 11 on Windows 10 Version 1607 for x64-based Systems |
Показывать по
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
Older Software Release
EPSS
5.3 Medium
CVSS3
Связанные уязвимости
Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to bypass Device Guard User Mode Code Integrity (UMCI) policies due to Internet Explorer failing to validate UMCI policies, aka "Internet Explorer Security Feature Bypass Vulnerability".
Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to bypass Device Guard User Mode Code Integrity (UMCI) policies due to Internet Explorer failing to validate UMCI policies, aka "Internet Explorer Security Feature Bypass Vulnerability".
EPSS
5.3 Medium
CVSS3