Windows Scripting Languages Remote Code Execution Vulnerability
Windows Scripting Languages Remote Code Execution Vulnerability
Apply updates per vendor instructions.
This vulnerability is currently on the CISA KEV list, which CISA only adds CVEs to when there is reliable evidence of active exploitation in the wild. For federal civilian agencies, BOD 22-01 requires remediation by the due date above. For everyone else, KEV is the strongest "patch immediately" signal you can get from public threat intel.
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Windows 10 Version 1809 | 10.0.17763.0 |
| Microsoft | Windows 10 Version 1809 | 10.0.0 |
| Microsoft | Windows Server 2019 | 10.0.17763.0 |
| Microsoft | Windows 10 Version 21H1 | 10.0.0 |
| Microsoft | Windows Server 2022 | 10.0.20348.0 |
| Microsoft | Windows 10 Version 20H2 | 10.0.0 |
| Microsoft | Windows 11 version 21H2 | 10.0.0 |
| Microsoft | Windows 10 Version 21H2 | 10.0.19043.0 |
| Microsoft | Windows 11 version 22H2 | 10.0.22621.0 |
| Microsoft | Windows 10 Version 22H2 | 10.0.19045.0 |
| Microsoft | Windows 10 Version 1507 | 10.0.10240.0 |
| Microsoft | Windows 10 Version 1607 | 10.0.14393.0 |
| Microsoft | Windows Server 2016 | 10.0.14393.0 |
| Microsoft | Windows 7 | 6.1.0 |
| Microsoft | Windows 7 Service Pack 1 | 6.1.0 |
| Microsoft | Windows 8.1 | 6.3.0 |
| Microsoft | Windows Server 2008 R2 Service Pack 1 | 6.1.7601.0 |
| Microsoft | Windows Server 2012 | 6.2.9200.0 |
| Microsoft | Windows Server 2012 R2 | 6.3.9600.0 |
Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection: