Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2017-11855 : What You Need to Know

Learn about CVE-2017-11855, a critical vulnerability in Internet Explorer on various Microsoft Windows versions, allowing attackers to exploit memory objects and gain unauthorized access.

A vulnerability known as "Internet Explorer Memory Corruption Vulnerability" exists in Internet Explorer, affecting various versions of Microsoft Windows. This vulnerability allows attackers to exploit how Internet Explorer handles objects in memory, potentially gaining user rights.

Understanding CVE-2017-11855

What is CVE-2017-11855?

This CVE refers to a vulnerability in Internet Explorer running on multiple versions of Microsoft Windows, enabling attackers to escalate privileges by manipulating memory objects.

The Impact of CVE-2017-11855

This vulnerability poses a significant risk as it allows attackers to obtain the same user rights as the current user, potentially leading to unauthorized access and control of the system.

Technical Details of CVE-2017-11855

Vulnerability Description

The vulnerability arises from how Internet Explorer manages memory objects, creating an opportunity for attackers to exploit this flaw.

Affected Systems and Versions

        Internet Explorer on Microsoft Windows 7 SP1
        Internet Explorer on Windows Server 2008 SP2 and R2 SP1
        Internet Explorer on Windows 8.1 and Windows RT 8.1
        Internet Explorer on Windows Server 2012 and R2
        Internet Explorer on Windows 10 Gold, 1511, 1607, 1703, 1709
        Internet Explorer on Windows Server 2016 and Windows Server, version 1709

Exploitation Mechanism

Attackers can exploit this vulnerability by manipulating memory objects in Internet Explorer, allowing them to gain unauthorized access and control over the affected system.

Mitigation and Prevention

Immediate Steps to Take

        Implement security patches provided by Microsoft promptly
        Consider using alternative web browsers until the vulnerability is patched
        Educate users on safe browsing practices and potential risks

Long-Term Security Practices

        Regularly update and patch software to mitigate known vulnerabilities
        Employ network segmentation and access controls to limit the impact of potential breaches

Patching and Updates

It is crucial to apply the latest security updates and patches released by Microsoft to address the CVE-2017-11855 vulnerability effectively.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now