MS.IE.wshom.ActiveX.Control.Remote.Code.Execution
Description
This indicates an attack attempt to exploit a remote Command Execution vulnerability in the Windows Script Host Runtime Library.
The vulnerability is located in the "wshom.ocx" ActiveX control. It can be exploited through misuse of the "Exec" method. It may allow remote attackers to execute arbitrary commands in the context of the application using the affected ActiveX control.
Affected Products
Windows Script Host Runtime Library.
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Disable this ActiveX Control by setting its kill bit.
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |