Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2023-36025

Опубликовано: 14 нояб. 2023
Источник: msrc
CVSS3: 8.8
EPSS Критический

Описание

Windows SmartScreen Security Feature Bypass Vulnerability

FAQ

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

The attacker would be able to bypass Windows Defender SmartScreen checks and their associated prompts.

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to click on a specially crafted Internet Shortcut (.URL) or a hyperlink pointing to an Internet Shortcut file to be compromised by the attacker.

Обновления

ПродуктСтатьяОбновление
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2012
Windows Server 2012 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 R2 (Server Core installation)

Показывать по

Возможность эксплуатации

Publicly Disclosed

Yes

Exploited

Yes

Latest Software Release

Exploitation Detected

DOS

N/A

EPSS

Процентиль: 100%
0.90662
Критический

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
больше 1 года назад

Windows SmartScreen Security Feature Bypass Vulnerability

CVSS3: 8.8
github
больше 1 года назад

Windows SmartScreen Security Feature Bypass Vulnerability

CVSS3: 8.8
fstec
больше 1 года назад

Уязвимость компонента защиты от фишинга и вредоносных программ SmartScreen операционных систем Windows, позволяющая нарушителю обойти ограничения безопасности

EPSS

Процентиль: 100%
0.90662
Критический

8.8 High

CVSS3