Rapid7 Vulnerability & Exploit Database

Microsoft CVE-2018-8113: Internet Explorer Security Feature Bypass Vulnerability

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Microsoft CVE-2018-8113: Internet Explorer Security Feature Bypass Vulnerability

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
06/12/2018
Created
07/25/2018
Added
06/12/2018
Modified
11/18/2021

Description

A security feature bypass vulnerability exists in Internet Explorer that allows for bypassing Mark of the Web Tagging (MOTW). Failing to set the MOTW means that a large number of Microsoft security technologies are bypassed. In a web-based attack scenario, an attacker could host a malicious website that is designed to exploit the security feature bypass. Alternatively, in an email or instant message attack scenario, the attacker could send the targeted user a specially crafted .url file that is designed to exploit the bypass. Additionally, compromised websites or websites that accept or host user-provided content could contain specially crafted content to exploit the security feature bypass. However, in all cases an attacker would have no way to force a user to view attacker-controlled content. Instead, an attacker would have to convince a user to take action. For example, an attacker could entice a user to either click a link that directs the user to the attacker's site or send a malicious attachment. The security update addresses the security feature bypass by correcting how Internet Explorer handles MOTW tagging.

Solution(s)

  • msft-kb4284819-09802fac-5d82-4589-9da1-a1b16f7516c6
  • msft-kb4284819-12056057-df80-4f20-a9f8-c8b9bd18ccd6
  • msft-kb4284819-af7712ab-eaad-4b7d-8b8e-2a060c2bfe53
  • msft-kb4284835-3c78a800-e801-4176-a748-b741cf1f302a
  • msft-kb4284835-f0914666-2046-4a90-8eeb-2a49b3a2d663
  • msft-kb4284835-f74f5aaf-95df-4818-8df0-2986a9d1a34e
  • msft-kb4284874-689410ed-3cb3-4b76-84b1-5b940e14ab6a
  • msft-kb4284874-fd45c4c5-93e4-4467-a41d-4876854a0a7c

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;