Windows Security Zone Mapping Security Feature Bypass Vulnerability
The product is vulnerable to file system contents disclosure through path equivalence. Path equivalence involves the use of special characters in file and directory names. The associated manipulations are intended to generate multiple names for the same object.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Windows_10_1507 | Microsoft | * | 10.0.10240.20766 (excluding) |
Windows_10_1607 | Microsoft | * | 10.0.14393.7336 (excluding) |
Windows_10_1809 | Microsoft | * | 10.0.17763.6293 (excluding) |
Windows_10_21h2 | Microsoft | * | 10.0.19044.4894 (excluding) |
Windows_10_22h2 | Microsoft | * | 10.0.19045.4894 (excluding) |
Windows_11_21h2 | Microsoft | * | 10.0.22000.3197 (excluding) |
Windows_11_22h2 | Microsoft | * | 10.0.22621.4169 (excluding) |
Windows_11_23h2 | Microsoft | * | 10.0.22631.4169 (excluding) |
Windows_11_24h2 | Microsoft | * | 10.0.26100.1742 (excluding) |
Windows_server_2008 | Microsoft | –sp2 (including) | –sp2 (including) |
Windows_server_2008 | Microsoft | r2-sp1 (including) | r2-sp1 (including) |
Windows_server_2012 | Microsoft | * | 6.2.9200.25073 (excluding) |
Windows_server_2012 | Microsoft | r2 (including) | r2 (including) |
Windows_server_2016 | Microsoft | * | 10.0.14393.7336 (excluding) |
Windows_server_2019 | Microsoft | * | 10.0.17763.6293 (excluding) |
Windows_server_2022 | Microsoft | * | 10.0.20348.2700 (excluding) |
Windows_server_2022_23h2 | Microsoft | * | 10.0.25398.1128 (excluding) |