CVE-2017-8625

HIGH
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to bypass Device Guard User Mode Code Integrity (UMCI) policies due to Internet Explorer failing to validate UMCI policies, aka "Internet Explorer Security Feature Bypass Vulnerability".

References

http://www.securityfocus.com/bid/100063

http://www.securitytracker.com/id/1039112

https://msitpros.com/?p=3909

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8625

https://posts.specterops.io/umci-vs-internet-explorer-exploring-cve-2017-8625-3946536c6442

Details

Source: MITRE

Published: 2017-08-08

Updated: 2019-10-03

Type: CWE-276

Risk Information

CVSS v2

Base Score: 6.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 8.6

Severity: MEDIUM

CVSS v3

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 2.8

Severity: HIGH

Tenable Plugins

View all (3 total)

IDNameProductFamilySeverity
104382KB4034668: Windows 10 August 2017 Cumulative UpdateNessusWindows : Microsoft Bulletins
high
102265KB4034660: Windows 10 Version 1511 August 2017 Cumulative UpdateNessusWindows : Microsoft Bulletins
high
102264KB4034658: Windows 10 Version 1607 and Windows Server 2016 August 2017 Cumulative UpdateNessusWindows : Microsoft Bulletins
high