CCE-26077-8Platform: cpe:/o:microsoft:windows_server_2012:- | Date: (C)2022-08-12 (M)2023-07-04 |
Configure default action after detection and advanced ROP mitigation settings
Fix:
(1) GPO: Computer ConfigurationAdministrative TemplatesWindows ComponentsEMETDefault Action and Mitigation Settings
(2) REG: HKEY_LOCAL_MACHINESoftwarePoliciesMicrosoftEMETSysSettings!DeepHooks
(2) REG: HKEY_LOCAL_MACHINESoftwarePoliciesMicrosoftEMETSysSettings!AntiDetours
(2) REG: HKEY_LOCAL_MACHINESoftwarePoliciesMicrosoftEMETSysSettings!BannedFunctions
(2) REG: HKEY_LOCAL_MACHINESoftwarePoliciesMicrosoftEMETSysSettings!ExploitAction
Parameter:
[Disabled/Enabled/User Configured, Disabled/Enabled/User Configured, Disabled/Enabled/User Configured, Audit Only/Stop Program/User Configured]
Technical Mechanism:
(1) GPO: Computer Configuration\Administrative Templates\Windows Components\EMET\Default Action and Mitigation Settings
(2) REG: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\EMET\SysSettings!DeepHooks
(2) REG: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\EMET\SysSettings!AntiDetours
(2) REG: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\EMET\SysSettings!BannedFunctions
(2) REG: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\EMET\SysSettings!ExploitAction
CCSS Severity: | CCSS Metrics: |
CCSS Score : 9.4 | Attack Vector: NETWORK |
Exploit Score: 3.9 | Attack Complexity: LOW |
Impact Score: 5.5 | Privileges Required: NONE |
Severity: CRITICAL | User Interaction: NONE |
Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H | Scope: UNCHANGED |
| Confidentiality: HIGH |
| Integrity: LOW |
| Availability: HIGH |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:82908 |