CCE-44085-9Platform: cpe:/o:microsoft:windows_10 | Date: (C)2016-09-23 (M)2023-07-04 |
Disable: 'Turn off Data Execution Prevention' for Explorer
Disabling data execution prevention can allow certain legacy plug-in applications to function without terminating Explorer.
Counter Measure:
We recommend that you disable this policy setting unless you have to support legacy business applications that do not support it.
Potential Impact:
Enabling this policy setting may allow certain legacy plug-in applications to function. Disabling this policy setting will ensure that Data Execution Prevention blocks certain types of malware from exploiting Explorer.
Parameter:
[enable/disable]
Technical Mechanism:
(1) GPO: Computer ConfigurationAdministrative TemplatesWindows ComponentsFile ExplorerTurn off Data Execution Prevention for Explorer
(2) REG: HKEY_LOCAL_MACHINESoftwarePoliciesMicrosoftWindowsExplorerNoDataExecutionPrevention
CCSS Severity: | CCSS Metrics: |
CCSS Score : 7.8 | Attack Vector: LOCAL |
Exploit Score: 1.8 | Attack Complexity: LOW |
Impact Score: 5.9 | Privileges Required: LOW |
Severity: HIGH | User Interaction: NONE |
Vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | Scope: UNCHANGED |
| Confidentiality: HIGH |
| Integrity: HIGH |
| Availability: HIGH |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:35388 |