Описание
Windows Kernel Security Feature Bypass Vulnerability
FAQ
What kind of security feature could be bypassed by successfully exploiting this vulnerability?
An attacker who successfully exploited this vulnerability could bypass the Windows Arbitrary Code Guard exploit protection feature.
According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L) and some loss of availability (A:L). What does that mean for this vulnerability?
An attacker can craft a malicious file that would bypass the Arbitrary Code Guard (ACG) exploit protection feature. However, after ACG is bypassed, while the data processed or protected can't be fully trusted, the attacker does not have full control over an exploited component with only this bypass. As a result, confidentiality of information resources managed by Windows is not in itself compromised (C:N), but both system integrity (I:L) and system availability (A:L) might experience limited compromises by this bypass.
For more on this feature please see: Arbitrary code guard.
Обновления
Продукт | Статья | Обновление |
---|---|---|
Windows 10 Version 1809 for 32-bit Systems | ||
Windows 10 Version 1809 for x64-based Systems | ||
Windows 10 Version 1809 for ARM64-based Systems | ||
Windows Server 2019 | ||
Windows Server 2019 (Server Core installation) | ||
Windows Server 2022 | ||
Windows Server 2022 (Server Core installation) | ||
Windows 11 version 21H2 for x64-based Systems | ||
Windows 11 version 21H2 for ARM64-based Systems | ||
Windows 10 Version 21H2 for 32-bit Systems |
Показывать по
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
DOS
EPSS
4.4 Medium
CVSS3
Связанные уязвимости
Windows Kernel Security Feature Bypass Vulnerability
Уязвимость ядра операционной системы Windows, связанная с ошибками в настройках безопасности, позволяющая нарушителю обойти существующие ограничения безопасности
EPSS
4.4 Medium
CVSS3