Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2017-11918 : Security Advisory and Response

Learn about CVE-2017-11918, a vulnerability in ChakraCore and Microsoft Edge allowing attackers to gain user privileges by exploiting memory handling. Find mitigation steps and affected systems here.

A vulnerability, known as "Scripting Engine Memory Corruption Vulnerability," exists in ChakraCore and Microsoft Edge in various versions of Windows. This CVE allows attackers to gain user privileges by exploiting memory handling in the scripting engine.

Understanding CVE-2017-11918

This CVE affects ChakraCore and Microsoft Edge in specific versions of Windows, potentially leading to remote code execution.

What is CVE-2017-11918?

CVE-2017-11918 is a vulnerability in ChakraCore and Microsoft Edge that enables attackers to acquire the same user privileges as the current user by exploiting memory handling in the scripting engine.

The Impact of CVE-2017-11918

The vulnerability allows for remote code execution, posing a significant security risk to affected systems.

Technical Details of CVE-2017-11918

This section provides detailed technical information about the vulnerability.

Vulnerability Description

The vulnerability in ChakraCore and Microsoft Edge allows attackers to exploit memory handling in the scripting engine to gain user privileges.

Affected Systems and Versions

        Products: ChakraCore, Microsoft Edge
        Vendor: Microsoft Corporation
        Versions: Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016

Exploitation Mechanism

Attackers can exploit the way the scripting engine handles objects in memory to execute remote code on vulnerable systems.

Mitigation and Prevention

Protecting systems from CVE-2017-11918 requires immediate action and long-term security practices.

Immediate Steps to Take

        Apply security patches provided by Microsoft promptly.
        Consider implementing additional security measures to mitigate the risk of remote code execution.

Long-Term Security Practices

        Regularly update software and systems to address security vulnerabilities.
        Educate users on safe browsing habits and potential risks associated with malicious websites.
        Employ network monitoring and intrusion detection systems to detect and prevent unauthorized access.
        Conduct regular security assessments and penetration testing to identify and address vulnerabilities.

Patching and Updates

Regularly check for security updates and patches from Microsoft to address CVE-2017-11918 and other potential vulnerabilities.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now