Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2023-32049

Опубликовано: 11 июл. 2023
Источник: msrc
CVSS3: 8.8
EPSS Средний

Описание

Windows SmartScreen Security Feature Bypass Vulnerability

FAQ

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

The attacker would be able to bypass the Open File - Security Warning prompt.

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to click on a specially crafted URL to be compromised by the attacker.

Обновления

ПродуктСтатьяОбновление
Windows Server 2016
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows Server 2016 (Server Core installation)
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows Server 2022

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

Yes

Latest Software Release

Exploitation Detected

DOS

N/A

EPSS

Процентиль: 93%
0.11774
Средний

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
почти 2 года назад

Windows SmartScreen Security Feature Bypass Vulnerability

CVSS3: 8.8
github
почти 2 года назад

Windows SmartScreen Security Feature Bypass Vulnerability

CVSS3: 8.8
fstec
почти 2 года назад

Уязвимость компонента защиты от фишинга и вредоносных программ SmartScreen операционных систем Windows, позволяющая нарушителю обойти ограничения безопасности

EPSS

Процентиль: 93%
0.11774
Средний

8.8 High

CVSS3