A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka "Windows VBScript Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
https://www.tenable.com/cyber-exposure/a-look-inside-the-ransomware-ecosystem
https://vb2020.vblocalhost.com/uploads/VB2020-06.pdf
https://securelist.com/cactuspete-apt-groups-updated-bisonal-backdoor/97962/
https://blog.talosintelligence.com/2020/03/bisonal-10-years-of-play.html
https://blog.talosintelligence.com/2018/07/multiple-cobalt-personality-disorder.html
https://crowdstrike.lookbookhq.com/global-threat-report-2018-web/cs-2018-global-threat-report
https://web.archive.org/web/20190508170630/https://www.riskiq.com/blog/labs/cobalt-strike/
https://www.ptsecurity.com/upload/corporate/ww-en/analytics/Cobalt-2017-eng.pdf
https://www.ptsecurity.com/upload/corporate/ww-en/analytics/Cobalt-Snatch-eng.pdf
Published: 2018-05-09
Updated: 2025-04-08
Named Vulnerability: Double KillKnown Exploited Vulnerability (KEV)
Base Score: 7.6
Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C
Severity: High
Base Score: 7.5
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Severity: High
EPSS: 0.94283