8.8
CVE-2023-36025
- EPSS 90.39%
- Veröffentlicht 14.11.2023 18:15:31
- Zuletzt bearbeitet 23.01.2025 18:17:42
- Quelle secure@microsoft.com
- Teams Watchlist Login
- Unerledigt Login
Windows SmartScreen Security Feature Bypass Vulnerability
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Microsoft ≫ Windows 10 1507 Version- HwPlatformx64
Microsoft ≫ Windows 10 1507 Version- HwPlatformx86
Microsoft ≫ Windows 10 1607 Version- HwPlatformx64
Microsoft ≫ Windows 10 1607 Version- HwPlatformx86
Microsoft ≫ Windows 10 1809 Version- HwPlatformarm64
Microsoft ≫ Windows 10 1809 Version- HwPlatformx64
Microsoft ≫ Windows 10 1809 Version- HwPlatformx86
Microsoft ≫ Windows 10 21h2 Version- HwPlatformarm64
Microsoft ≫ Windows 10 21h2 Version- HwPlatformx64
Microsoft ≫ Windows 10 21h2 Version- HwPlatformx86
Microsoft ≫ Windows 10 22h2 Version- HwPlatformarm64
Microsoft ≫ Windows 10 22h2 Version- HwPlatformx64
Microsoft ≫ Windows 10 22h2 Version- HwPlatformx86
Microsoft ≫ Windows 11 21h2 Version- HwPlatformarm64
Microsoft ≫ Windows 11 21h2 Version- HwPlatformx64
Microsoft ≫ Windows 11 22h2 Version- HwPlatformarm64
Microsoft ≫ Windows 11 22h2 Version- HwPlatformx64
Microsoft ≫ Windows 11 23h2 Version- HwPlatformarm64
Microsoft ≫ Windows 11 23h2 Version- HwPlatformx64
Microsoft ≫ Windows Server 2008 Version- Updatesp2 HwPlatformx86
Microsoft ≫ Windows Server 2008 Versionr2 Updatesp1 HwPlatformx64
Microsoft ≫ Windows Server 2012 Version-
Microsoft ≫ Windows Server 2012 Versionr2
Microsoft ≫ Windows Server 2016 Version < 10.0.14393.6452
Microsoft ≫ Windows Server 2019 Version < 10.0.17763.5122
Microsoft ≫ Windows Server 2022 Version < 10.0.20348.2113
14.11.2023: CISA Known Exploited Vulnerabilities (KEV) Catalog
Microsoft Windows SmartScreen Security Feature Bypass Vulnerability
SchwachstelleMicrosoft Windows SmartScreen contains a security feature bypass vulnerability that could allow an attacker to bypass Windows Defender SmartScreen checks and their associated prompts.
BeschreibungApply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Erforderliche MaßnahmenTyp | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 90.39% | 0.996 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
secure@microsoft.com | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|