MSRC compact vulnerability detail

CVE-2022-41128 · Windows Scripting Languages Remote Code Execution Vulnerability

No description was published by MSRC.

Severity
Critical
Impact
Remote Code Execution
CVSS
8.8 base · 8.2 temporal
Release
2022-11-08
Signals
Windows Scripting Remote Code Execution Exploited: Yes Publicly disclosed: No Exploitability: Exploitation Detected
CWE
No CWE data published.
Patch Diff
Loading module diff metadata...
Resolved binary override
Use this when the MSRC module name cannot be mapped automatically or the resolved binary looks wrong.
Old version New version
Description
No description was published by MSRC.
FAQ / Articles
FAQ
The CVE title says Windows Scripting Languages, what does that mean for this vulnerability? This vulnerability impacts the JScript9 scripting language.
FAQ
According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? This vulnerability requires that a user with an affected version of Windows access a malicious server. An attacker would have to host a specially crafted server share or website. An attacker would have no way to force users to visit this specially crafted server share or website, but would have to convince them to visit the server share or website, typically by way of an enticement in an email or chat message.