CCE-45876-0Platform: cpe:/o:microsoft:windows_server_2016 | Date: (C)2017-08-03 (M)2023-07-04 |
Disabling data execution prevention can allow certain legacy plug-in applications to function without terminating Explorer.
Vulnerability:
Data Execution Prevention is an important security feature supported by Explorer that helps to limit the impact of certain types of malware.
Counter Measure:
We recommend that you disable this policy setting unless you have to support legacy business applications that do not support it.
Potential Impact:
Enabling this policy setting may allow certain legacy plug-in applications to function. Disabling this policy setting will ensure that Data Execution Prevention blocks certain types of malware from exploiting Explorer.
Fix:
(1) GPO: Computer ConfigurationAdministrative TemplatesWindows ComponentsFile ExplorerTurn off Data Execution Prevention for Explorer
(2) REG: HKEY_LOCAL_MACHINESoftwarePoliciesMicrosoftWindowsExplorer!NoDataExecutionPrevention
Parameter:
[enable/disable]
Technical Mechanism:
(1) GPO: Computer Configuration\Administrative Templates\Windows Components\File Explorer\Turn off Data Execution Prevention for Explorer
(2) REG: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Explorer!NoDataExecutionPrevention
CCSS Severity: | CCSS Metrics: |
CCSS Score : 7.8 | Attack Vector: LOCAL |
Exploit Score: 1.8 | Attack Complexity: LOW |
Impact Score: 5.9 | Privileges Required: LOW |
Severity: HIGH | User Interaction: NONE |
Vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | Scope: UNCHANGED |
| Confidentiality: HIGH |
| Integrity: HIGH |
| Availability: HIGH |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:40329 |