Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2017-11858 : Security Advisory and Response

Learn about CVE-2017-11858, a critical vulnerability in Microsoft products, enabling attackers to gain user privileges. Find mitigation steps and affected systems here.

CVE-2017-11858, known as the "Scripting Engine Memory Corruption Vulnerability," affects various Microsoft products and versions. This vulnerability allows attackers to gain user privileges by exploiting how Microsoft browsers handle objects in memory.

Understanding CVE-2017-11858

This CVE impacts a range of Microsoft products and versions, potentially leading to remote code execution.

What is CVE-2017-11858?

The vulnerability in Microsoft Windows and browsers enables attackers to elevate their privileges to those of the current user, posing a significant security risk.

The Impact of CVE-2017-11858

The vulnerability can result in remote code execution, allowing attackers to execute malicious code on affected systems.

Technical Details of CVE-2017-11858

This section delves into the specifics of the vulnerability.

Vulnerability Description

The flaw in ChakraCore, Microsoft Edge, and Internet Explorer versions on various Windows platforms enables attackers to exploit memory corruption for privilege escalation.

Affected Systems and Versions

        Products: ChakraCore, Microsoft Edge, Internet Explorer
        Vendor: Microsoft Corporation
        Versions: Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1, Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016, and Windows Server version 1709

Exploitation Mechanism

Attackers can exploit the way Microsoft browsers handle objects in memory to execute arbitrary code and gain user privileges.

Mitigation and Prevention

Protecting systems from CVE-2017-11858 is crucial for maintaining security.

Immediate Steps to Take

        Apply security patches and updates from Microsoft promptly.
        Consider disabling scripting engines in browsers to mitigate the risk.
        Implement strong web browsing security practices.

Long-Term Security Practices

        Regularly update and patch all software and operating systems.
        Conduct security training for users to recognize and report suspicious activities.

Patching and Updates

Regularly check for security updates and patches from Microsoft to address vulnerabilities like CVE-2017-11858.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now