Описание
Windows Mobile Hotspot Information Disclosure Vulnerability
FAQ
What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.
According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
Exploitation of the vulnerability requires a user to first turn on the Mobile Hotspot before the attacker starts the exploitation.
According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?
An authorized attacker with guest/low privileges must first gain access to the local system, then wait for or trick the user into turning on the Mobile Hotspot feature.
Only when the Mobile Hotspot is turned on does the vulnerability become exploitable. Therefore, this attack vector requires both attacker authentication (to access the local system) and user interaction (to turn on the Mobile Hotspot).
Обновления
Продукт | Статья | Обновление |
---|---|---|
Windows 10 for 32-bit Systems | ||
Windows 10 for x64-based Systems | ||
Windows Server 2016 | ||
Windows 10 Version 1607 for 32-bit Systems | ||
Windows 10 Version 1607 for x64-based Systems | ||
Windows Server 2016 (Server Core installation) | ||
Windows 10 Version 1809 for 32-bit Systems | ||
Windows 10 Version 1809 for x64-based Systems | ||
Windows 10 Version 1809 for ARM64-based Systems | ||
Windows Server 2019 |
Показывать по
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
DOS
EPSS
5 Medium
CVSS3
Связанные уязвимости
Windows Mobile Hotspot Information Disclosure Vulnerability
Windows Mobile Hotspot Information Disclosure Vulnerability
Уязвимость службы для создания точки доступа Wi-Fi Windows Mobile Hotspot операционных систем Windows, позволяющая злоумышленнику раскрыть защищаемую информацию
EPSS
5 Medium
CVSS3