⚠ Actively exploited
Added to CISA KEV on 2022-11-08. Federal agencies required to patch by 2022-12-09. Required action: Apply updates per vendor instructions..

CVE-2022-41128

CWE-787Out-of-bounds Write10 documents9 sources
Severity
8.8HIGH
EPSS
39.2%
top 2.71%
CISA KEV
KEV
Added 2022-11-08
Due 2022-12-09
Exploit
Exploited in wild
Active exploitation observed
Timeline
KEV addedNov 8
PublishedNov 9
Latest updateNov 10
KEV dueDec 9
CISA Required Action: Apply updates per vendor instructions.

Description

Windows Scripting Languages Remote Code Execution Vulnerability

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages29 packages

NVDmicrosoft/windows< 10.0.14393.5501+3
CVEListV5microsoft/windows_76.1.06.1.7601.26221
CVEListV5microsoft/windows_8.16.3.06.3.9600.20671
NVDmicrosoft/windows_10_1507< 10.0.10240.19567
NVDmicrosoft/windows_10_1607< 10.0.14393.5501

Patches

🔴Vulnerability Details

4
GHSA
GHSA-778m-x5h7-mg59: Windows Scripting Languages Remote Code Execution Vulnerability2022-11-10
CVEList
Windows Scripting Languages Remote Code Execution Vulnerability2022-11-09
VulnCheck
Microsoft Windows Scripting Languages Remote Code Execution Vulnerability2022
Project0
Project Zero RCA: CVE-2022-41128: Type confusion in Internet Explorer's JScript9 engine

📋Vendor Advisories

2
Microsoft
Windows Scripting Languages Remote Code Execution Vulnerability2022-11-08
CISA
Microsoft Windows Scripting Languages Remote Code Execution Vulnerability2022-11-08

🕵️Threat Intelligence

1
Krebs
Patch Tuesday, November 2022 Election Edition2022-11-09
CVE-2022-41128 (HIGH CVSS 8.8) | Windows Scripting Languages Remote | cvebase.io