Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2022-41128

Опубликовано: 08 нояб. 2022
Источник: msrc
CVSS3: 8.8
EPSS Высокий

Описание

Windows Scripting Languages Remote Code Execution Vulnerability

FAQ

The CVE title says Windows Scripting Languages, what does that mean for this vulnerability?

This vulnerability impacts the JScript9 scripting language.

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

This vulnerability requires that a user with an affected version of Windows access a malicious server. An attacker would have to host a specially crafted server share or website. An attacker would have no way to force users to visit this specially crafted server share or website, but would have to convince them to visit the server share or website, typically by way of an enticement in an email or chat message.

Обновления

ПродуктСтатьяОбновление
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2012
Windows 8.1 for 32-bit systems
Windows 8.1 for x64-based systems
Windows Server 2012 R2
Windows RT 8.1
-
Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

Yes

Latest Software Release

Exploitation Detected

DOS

N/A

EPSS

Процентиль: 99%
0.75375
Высокий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
больше 2 лет назад

Windows Scripting Languages Remote Code Execution Vulnerability

CVSS3: 8.8
github
больше 2 лет назад

Windows Scripting Languages Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-41118.

CVSS3: 8.8
fstec
больше 2 лет назад

Уязвимость динамически подключаемой библиотеки обработчика сценариев (jscript9.dll) операционной системы Windows, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 99%
0.75375
Высокий

8.8 High

CVSS3