Protection mechanism failure in Windows Shell allows an unauthorized attacker to bypass a security feature over a network.
| Vendor | Product | Versions |
|---|---|---|
| microsoft | windows_10_1607 | 10.0.14393.0, 10.0.17763.0, 10.0.19044.0, 10.0.19045.0, 10.0.22631.0, 10.0.22631.0, 10.0.26100.0, 10.0.26200.0, 10.0.28000.0, 10.0.28000.0, 6.2.9200.0, 6.2.9200.0, 6.3.9600.0, 6.3.9600.0, 10.0.14393.0, 10.0.14393.0, 10.0.17763.0, 10.0.17763.0, 10.0.20348.0, 10.0.25398.0, 10.0.26100.0, 10.0.26100.0 |
Downstream vendors/products affected by this vulnerability
| Vendor | Product | Source | Confidence |
|---|---|---|---|
| microsoft | windows_server_2016 | cve_cpe | 95% |
| microsoft | windows_server_2019 | cve_cpe | 95% |
| microsoft | windows_11_24h2 | cve_cpe | 95% |
| microsoft | windows_11_25h2 | cve_cpe | 95% |
| microsoft | windows_server_2012 | cve_cpe | 95% |
Updated severity to MEDIUM and CVSS to 4.3, added new IOC domain 'attacker.com' and new tags related to spoofing and zero-click vulnerabilities.
Updated description with details on zero-click attacks and added new CWE and tags related to the vulnerability.
Updated severity to CRITICAL, CVSS score to 9.8, and added new tag 'security feature bypass'.
Initial creation