First published: Tue Feb 13 2024(Updated: )
Microsoft Windows SmartScreen contains a security feature bypass vulnerability that allows an attacker to bypass the SmartScreen user experience and inject code to potentially gain code execution, which could lead to some data exposure, lack of system availability, or both.
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server 2016 | ||
Microsoft Windows 10 | =21H2 | |
Microsoft Windows 10 | =21H2 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows Server 2022 | ||
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | ||
Microsoft Windows 10 | =1607 | |
Microsoft Windows 11 | =23H2 | |
Microsoft Windows 10 | =22H2 | |
Microsoft Windows 11 | =23H2 | |
Microsoft Windows Server 2019 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | =1809 | |
Microsoft Windows 11 | =21H2 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 11 | =21H2 | |
Microsoft Windows 10 | =22H2 | |
Microsoft Windows 11 | =22H2 | |
Microsoft Windows 11 | =22H2 | |
Microsoft Windows 10 | =22H2 | |
Microsoft Windows 10 | =21H2 | |
Microsoft Windows | ||
Microsoft Windows 10 1507 | <10.0.10240.20469 | |
Microsoft Windows 10 1607 | <10.0.14393.6709 | |
Microsoft Windows 10 1809 | <10.0.17763.5458 | |
Microsoft Windows 10 21h2 | <10.0.19044.4046 | |
Microsoft Windows 10 22h2 | <10.0.19045.4046 | |
Microsoft Windows 11 21h2 | <10.0.22000.2777 | |
Microsoft Windows 11 22h2 | <10.0.22621.3155 | |
Microsoft Windows 11 23h2 | <10.0.22631.3155 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2019 | <10.0.17763.5458 | |
Microsoft Windows Server 2022 | <10.0.20348.2322 | |
Microsoft Windows Server 2022 23h2 | <10.0.25398.709 | |
<10.0.10240.20469 | ||
<10.0.14393.6709 | ||
<10.0.17763.5458 | ||
<10.0.19044.4046 | ||
<10.0.19045.4046 | ||
<10.0.22000.2777 | ||
<10.0.22621.3155 | ||
<10.0.22631.3155 | ||
<10.0.17763.5458 | ||
<10.0.20348.2322 | ||
<10.0.25398.709 |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)