Arbitrary code execution vulnerability in Microsoft Malware Protection Engine

Обновлено: 18/06/2020
Дата обнаружения
Уровень угрозы

An improper scanning of specially designed files was found in Microsoft Malware Protection Engine in Microsoft Windows. By exploiting this vulnerability malicious users can execute arbitrary code. This vulnerability can be exploited remotely by putting a specially designed file to a directory scanned by the Microsoft Malware Protection Engine. It can be done via a website when it is being viewed by a user, via email message or an Instant Messenger message or a shared location.

Пораженные продукты

Microsoft Windows 7  Service Pack 1
Microsoft Windows 8.1
Microsoft Windows RT 8.1
Microsoft Windows 10 
Microsoft Windows Server 2008 Service Pack 2 
Microsoft Windows Server 2008 R2 Service Pack 1 
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2


Check whether version of Microsoft Malware Protection Engine is later than 1.1.13804.0 or not. If it is necessary — install update. However, enterprise administrators or end users do not have to take any actions to install updates for Microsoft Malware Protection Engine because the update will be detected and applied automatically within 48 hours of release.

Первичный источник обнаружения
Оказываемое влияние
Связанные продукты
Microsoft Windows 7
Microsoft Windows Server 2008
Microsoft Windows 10

The following public exploits exists for this vulnerability:


Узнай статистику распространения уязвимостей в твоем регионе