Description: | Summary: This host is missing a critical security update according to Microsoft KB4088786
Vulnerability Insight: Multiple flaws exist due to:
- The way that the scripting engine handles objects in memory in Microsoft Edge and Internet Explorer.
- When Windows Hyper-V on a host operating system fails to properly validate input from an authenticated user or a privileged user on a guest operating system.
- Windows Scripting Host which could allow an attacker to bypass Device Guard.
- An error in the Credential Security Support Provider protocol (CredSSP).
- When Windows Shell does not properly validate file copy destinations.
- When Internet Explorer fails a check, allowing sandbox escape.
- The Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass.
- Windows Installer when the Windows Installer fails to properly sanitize input leading to an insecure library loading behavior.
- An error in the Cryptography Next Generation (CNG) kernel-mode driver.
- The Windows kernel improperly initializes objects in memory.
- When Windows Remote Assistance incorrectly processes XML External Entities (XXE).
- The way that the Windows Graphics Device Interface (GDI) handles objects in memory.
Vulnerability Impact: Successful exploitation will allow attacker to gain access to information, crash server and run arbitrary code in system mode.
Affected Software/OS: - Microsoft Windows 10 for 32-bit Systems
- Microsoft Windows 10 for x64-based Systems
Solution: The vendor has released updates. Please see the references for more information.
CVSS Score: 7.6
CVSS Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C
|