CVE-2017-8636
high-risk
Published 2017-08-08
Microsoft browsers in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user due to the way that Microsoft browser JavaScript engines render content when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8634, CVE-2017-8635, CVE-2017-8638, CVE-2017-8639, CVE-2017-8640, CVE-2017-8641, CVE-2017-8645, CVE-2017-8646, CVE-2017-8647, CVE-2017-8655, CVE-2017-8656, CVE-2017-8657, CVE-2017-8670, CVE-2017-8671, CVE-2017-8672, and CVE-2017-8674.
Do I need to act?
!
82.7% chance of exploitation in next 30 days
EPSS score — higher than 17% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ HIGH complexity
Affected Products (4)
Affected Vendors
References (16)
Third Party Advisory
http://www.securityfocus.com/bid/100056
Third Party Advisory
http://www.securitytracker.com/id/1039094
Third Party Advisory
http://www.securitytracker.com/id/1039095
Third Party Advisory
http://www.securityfocus.com/bid/100056
Third Party Advisory
http://www.securitytracker.com/id/1039094
Third Party Advisory
http://www.securitytracker.com/id/1039095
59
/ 100
high-risk
Severity
22/34 · High
Exploitability
27/34 · High
Exposure
10/34 · Low