7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.0004 Low
EPSS
Percentile
0.4%
A vulnerability in Microsoft Windows Shell may allow an attacker to gain access with escalated privileges.
The Microsoft Windows Shell Hardware Detection service provides notification for AutoPlay hardware events. This service fails to properly validate a function parameter in the way that hardware is detected and initialized which may allow access with escalated privileges. An attacker with the ability to run a specially crafted application that forces the system to perform a hardware detection and initialization event, may be able to exploit this vulnerability.
A local, authenticated attacker may be able to access the system with escalated privileges. Secondary impacts include: the ability to install programs; view, change or delete data; or create new accounts with full user rights.
Microsoft has released an update to address this issue. Please see Microsoft Security Bulletin MS07-006 for more details.
Workaround
Disable the Shell Hardware Detection service
Disabling the Shell Hardware Detection service will help protect the affected system from attempts to exploit this vulnerability. To disable the Shell Hardware Detection service, follow these steps:
1. Click Start, and then click Control Panel. Alternatively, point to Settings, and then click Control Panel.
2. Double-click Administrative Tools.
3. Double-click Services.
4. Double-click Shell Hardware Detection service.
5. In the Startup type list, click Disabled.
6. Click Stop, and then click OK.
Please note that disabling the Shell Hardware Detection service may limit Fast User switching capabilities.
240796
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: February 15, 2007
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Please see Microsoft Security Bulletin MS07-006 for further information.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23240796 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
This vulnerability was reported in Microsoft Security Bulletin MS07-006.
This document was written by Katie Steiner.
CVE IDs: | CVE-2007-0211 |
---|---|
Severity Metric: | 9.14 Date Public: |