Описание
Windows SmartScreen Spoofing Vulnerability
FAQ
According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
An attacker would have to send the victim a malicious file that the victim would have to execute.
Обновления
| Продукт | Статья | Обновление |
|---|---|---|
| Windows Server 2016 | ||
| Windows 10 Version 1607 for 32-bit Systems | ||
| Windows 10 Version 1607 for x64-based Systems | ||
| Windows Server 2016 (Server Core installation) | ||
| Windows 10 Version 1809 for 32-bit Systems | ||
| Windows 10 Version 1809 for x64-based Systems | ||
| Windows Server 2019 | ||
| Windows Server 2019 (Server Core installation) | ||
| Windows Server 2022 | ||
| Windows Server 2022 (Server Core installation) |
Показывать по
10
Возможность эксплуатации
Publicly Disclosed
No
Exploited
No
Latest Software Release
Exploitation More Likely
EPSS
Процентиль: 43%
0.00203
Низкий
6.5 Medium
CVSS3
Связанные уязвимости
CVSS3: 6.5
fstec
10 месяцев назад
Уязвимость компонента защиты от фишинга и вредоносных программ SmartScreen операционных систем Windows, позволяющая нарушителю проводить спуфинг-атаки
EPSS
Процентиль: 43%
0.00203
Низкий
6.5 Medium
CVSS3