CERT-In Vulnerability Note
CIVN-2023-0078
Security Bypass Vulnerability in Microsoft Windows SmartScreen
Original Issue Date:March 15, 2023
Severity Rating: HIGH
Software Affected
- Windows Server 2022 (Server Core installation)
- Windows Server 2022
- Windows 10 Version 21H2 for ARM64-based Systems
- Windows 10 Version 21H2 for 32-bit Systems
- Windows 11 version 21H2 for ARM64-based Systems
- Windows 11 version 21H2 for x64-based Systems
- Windows 10 Version 20H2 for ARM64-based Systems
- Windows 10 Version 20H2 for 32-bit Systems
- Windows 10 Version 20H2 for x64-based Systems
- Windows Server 2019 (Server Core installation)
- Windows Server 2019
- Windows 10 Version 1809 for ARM64-based Systems
- Windows 10 Version 1809 for x64-based Systems
- Windows 10 Version 1809 for 32-bit Systems
- Windows Server 2016 (Server Core installation)
- Windows Server 2016
- Windows 10 Version 1607 for x64-based Systems
- Windows 10 Version 1607 for 32-bit Systems
- Windows 10 Version 22H2 for 32-bit Systems
- Windows 10 Version 22H2 for ARM64-based Systems
- Windows 10 Version 22H2 for x64-based Systems
- Windows 11 Version 22H2 for x64-based Systems
- Windows 11 Version 22H2 for ARM64-based Systems
- Windows 10 Version 21H2 for x64-based Systems
Overview
A vulnerability has been reported in Microsoft Windows SmartScreen which could be exploited by a remote attacker to bypass security restrictions on the targeted system.
Description
This vulnerability exists in Microsoft Windows SmartScreen due to security bypass of Mark of the Web (MOTW) defenses. An attacker could exploit this vulnerability by crafting a malicious file that would evade Mark of the Web (MOTW) defenses, resulting in a limited loss of integrity and availability of security features.
Successful exploitation of this vulnerability could allow a remote attacker to bypass security restrictions on the targeted system.
Solution
Apply appropriate security updates as mentioned in the below link:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24880
Vendor Information
Microsoft
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24880
References
Microsoft
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24880
CVE Name
CVE-2023-24880
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|