Windows SmartScreen Security Feature Bypass Vulnerability
Published: 2023-11-14
Microsoft addresses 57 CVEs, including three zero-day vulnerabilities that were exploited in the wild.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36025
https://securelist.com/vulnerabilities-and-exploits-in-q4-2024/115761/
https://www.zerodayinitiative.com/blog/2025/1/8/zdi-threat-hunting-2024-highlights-trends-amp-challenges
https://www.bleepingcomputer.com/news/microsoft/new-windows-smartscreen-bypass-exploited-as-zero-day-since-march/
https://research.checkpoint.com/2024/resurrecting-internet-explorer-threat-actors-using-zero-day-tricks-in-internet-shortcut-file-to-lure-victims-cve-2024-38112/
https://thehackernews.com/2024/06/darkgate-malware-replaces-autoit-with.html
https://securelist.com/vulnerability-report-q1-2024/112554/
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/the-darkgate-menace-leveraging-autohotkey-attempt-to-evade-smartscreen/
https://www.trendmicro.com/en_us/research/24/c/cve-2024-21412--darkgate-operators-exploit-microsoft-windows-sma.html
https://unit42.paloaltonetworks.com/mispadu-infostealer-variant/?web_view=true
https://www.trendmicro.com/en_us/research/24/a/cve-2023-36025-exploited-for-defense-evasion-in-phemedrone-steal.html?&web_view=true
https://www.proofpoint.com/us/blog/threat-insight/battleroyal-darkgate-cluster-spreads-email-and-fake-browser-updates
https://twitter.com/ffforward/status/1726540034462159165
https://www.tenable.com/blog/microsofts-feb-2024-patch-tuesday-cve-2024-21351-cve-2024-21412
https://www.tenable.com/blog/microsofts-november-2023-patch-tuesday-addresses-57-cves-cve-2023-36025
Source: Mitre, NVD
Updated: 2025-01-23
Known Exploited Vulnerability (KEV)
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Severity: Critical
Base Score: 8.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Severity: High
EPSS: 0.90725