Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2019-1167

Опубликовано: 16 июл. 2019
Источник: msrc
EPSS Низкий

Описание

Windows Defender Application Control Security Feature Bypass Vulnerability

A security feature bypass vulnerability exists in Windows Defender Application Control (WDAC) which could allow an attacker to bypass WDAC enforcement. An attacker who successfully exploited this vulnerability could circumvent PowerShell Core Constrained Language Mode on the machine.

To exploit the vulnerability, an attacker would first have administrator access to the local machine where PowerShell is running in Constrained Language mode. By doing that an attacker could access resources in an unintended way.

The update addresses the vulnerability by correcting how PowerShell functions in Constrained Language Mode.

Обновления

ПродуктСтатьяОбновление
PowerShell Core 6.1
PowerShell Core 6.2

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation More Likely

Older Software Release

Exploitation More Likely

DOS

N/A

EPSS

Процентиль: 48%
0.00242
Низкий

Связанные уязвимости

CVSS3: 4.1
nvd
около 6 лет назад

A security feature bypass vulnerability exists in Windows Defender Application Control (WDAC) which could allow an attacker to bypass WDAC enforcement, aka 'Windows Defender Application Control Security Feature Bypass Vulnerability'.

CVSS3: 4.1
github
около 6 лет назад

System.Management.Automation subject to bypass via script debugging

CVSS3: 6.4
fstec
около 6 лет назад

Уязвимость средства контроля приложений Управление приложениями в Защитнике Windows (Windows Defender Application Control, WDAC) расширяемого средства автоматизации PowerShell Core, позволяющая нарушителю обойти режим PowerShell Core Constrained Language Mode и оказать воздействие на целостность, конфиденциальность и доступность защищаемой информации

EPSS

Процентиль: 48%
0.00242
Низкий