Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2017-11823Race Condition in Corporation Device Guard

CWE-362Race Condition5 documents5 sources
Severity
6.7MEDIUMNVD
EPSS
3.4%
top 12.47%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedOct 13
Latest updateMay 13

Description

The Microsoft Device Guard on Microsoft Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows a security feature bypass by the way it handles Windows PowerShell sessions, aka "Microsoft Windows Security Feature Bypass".

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 0.8 | Impact: 5.9

Affected Packages11 packages

NVDmicrosoft/windows_101511, 1607, 1703+2
CVEListV5microsoft_corporation/device_guardWindows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016

Patches

🔴Vulnerability Details

1
GHSA
GHSA-g3f2-7wv6-4cx5: The Microsoft Device Guard on Microsoft Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows a security feature bypass by the way it2022-05-13

💥Exploits & PoCs

1
Exploit-DB
Microsoft Windows 10 - WLDP/MSHTML CLSID UMCI Bypass2017-10-17

📋Vendor Advisories

1
Microsoft
Device Guard Code Integrity Policy Security Feature Bypass Vulnerability2017-10-10

🕵️Threat Intelligence

1
Talos
Microsoft Patch Tuesday - October 20172017-10-10
CVE-2017-11823 — Race Condition | cvebase