Описание
Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability
FAQ
What privileges would an attacker gain by successfully exploiting this vulnerability?
An attacker who successfully exploited this vulnerability could load a non-Microsoft DLL into an enclave, potentially leading to code execution within the context of the target enclave.
Обновления
Продукт | Статья | Обновление |
---|---|---|
Windows 10 Version 1809 for 32-bit Systems | ||
Windows 10 Version 1809 for x64-based Systems | ||
Windows Server 2019 | ||
Windows Server 2019 (Server Core installation) | ||
Windows Server 2022 | ||
Windows Server 2022 (Server Core installation) | ||
Windows 10 Version 21H2 for 32-bit Systems | ||
Windows 10 Version 21H2 for ARM64-based Systems | ||
Windows 10 Version 21H2 for x64-based Systems | ||
Windows 11 Version 22H2 for ARM64-based Systems |
Показывать по
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
DOS
EPSS
7.8 High
CVSS3
Связанные уязвимости
Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability
Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability
Уязвимость доверенной среды выполнения Virtualization-Based Security (VBS) Enclave операционных систем Microsoft Windows, позволяющая нарушителю повысить свои привилегии
EPSS
7.8 High
CVSS3