INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global malware Technology and Software Development CRITICAL 59m Global ddos Technology and Social Media HIGH 1h Global phishing Financial Services, Telecommunications, General Public HIGH 1h Global supply_chain Software Development and Technology CRITICAL 2h Global apt Multiple sectors / Critical Infrastructure CRITICAL 2h Global malware Financial Services CRITICAL 3h Global general Software/Technology LOW 3h Global malware Energy CRITICAL 3h Global spyware Software/Technology HIGH 3h Global malware Telecommunications and ISP HIGH 4h Global malware Technology and Software Development CRITICAL 59m Global ddos Technology and Social Media HIGH 1h Global phishing Financial Services, Telecommunications, General Public HIGH 1h Global supply_chain Software Development and Technology CRITICAL 2h Global apt Multiple sectors / Critical Infrastructure CRITICAL 2h Global malware Financial Services CRITICAL 3h Global general Software/Technology LOW 3h Global malware Energy CRITICAL 3h Global spyware Software/Technology HIGH 3h Global malware Telecommunications and ISP HIGH 4h Global malware Technology and Software Development CRITICAL 59m Global ddos Technology and Social Media HIGH 1h Global phishing Financial Services, Telecommunications, General Public HIGH 1h Global supply_chain Software Development and Technology CRITICAL 2h Global apt Multiple sectors / Critical Infrastructure CRITICAL 2h Global malware Financial Services CRITICAL 3h Global general Software/Technology LOW 3h Global malware Energy CRITICAL 3h Global spyware Software/Technology HIGH 3h Global malware Telecommunications and ISP HIGH 4h
Vulnerabilities

CVE-2015-0071

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Microsoft Internet Explorer ASLR Bypass Vulnerability — Microsoft Internet Explorer allows remote attackers to bypass the address space layout randomization (ASLR) protection mechanism via a crafted w
Published: May 25, 2022  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Microsoft Internet Explorer ASLR Bypass Vulnerability — Microsoft Internet Explorer allows remote attackers to bypass the address space layout randomization (ASLR) protection mechanism via a crafted web site.

🤖 AI Executive Summary

CVE-2015-0071 is a critical ASLR bypass vulnerability in Microsoft Internet Explorer that allows remote attackers to defeat memory protection mechanisms through malicious websites. With a CVSS score of 9.0 and active exploits available, this vulnerability significantly increases the success rate of memory corruption attacks. While a patch is available, legacy IE installations in Saudi organizations remain at high risk, particularly in government and banking sectors where older systems may still be in use.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Mar 28, 2026 08:09
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability poses significant risk to Saudi organizations still running legacy Internet Explorer, particularly government entities under NCA oversight, SAMA-regulated financial institutions, and critical infrastructure operators. Banking sector (SAMA-regulated) faces elevated risk due to potential credential theft and transaction manipulation. Government portals and internal systems using IE for compatibility with legacy applications are vulnerable to targeted attacks. Healthcare sector (MOH facilities) using IE for medical record systems could face data breaches. Energy sector (ARAMCO, SEC) with SCADA/ICS systems using IE-based interfaces are at critical risk. Telecom providers (STC, Mobily, Zain) with customer portals may expose subscriber data.
🏢 Affected Saudi Sectors
Banking Government Healthcare Energy Telecommunications Education Critical Infrastructure
⚖️ Saudi Risk Score (AI)
8.7
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Conduct urgent asset inventory to identify all systems running Internet Explorer across the organization
2. Block access to untrusted websites through web filtering and proxy controls
3. Enable Enhanced Protected Mode (EPM) in IE if migration is not immediately possible
4. Implement network segmentation to isolate systems still requiring IE

PATCHING GUIDANCE:
5. Apply Microsoft Security Bulletin MS15-018 immediately to all IE installations
6. Prioritize patching for internet-facing systems and those processing sensitive data
7. Verify patch deployment through WSUS, SCCM, or endpoint management tools

MIGRATION STRATEGY:
8. Accelerate migration to Microsoft Edge or modern browsers (Chrome, Firefox)
9. Use IE Mode in Edge for legacy application compatibility
10. Disable Internet Explorer completely where not required for business operations

COMPENSATING CONTROLS:
11. Deploy Enhanced Mitigation Experience Toolkit (EMET) on systems that cannot be immediately patched
12. Implement application whitelisting to prevent unauthorized code execution
13. Enable Windows Defender Exploit Guard on Windows 10+ systems

DETECTION:
14. Monitor for suspicious IE process behavior using EDR solutions
15. Alert on IE accessing unusual memory regions or spawning unexpected child processes
16. Review web proxy logs for connections to known exploit kit domains
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. إجراء جرد عاجل للأصول لتحديد جميع الأنظمة التي تشغل إنترنت إكسبلورر في المؤسسة
2. حظر الوصول إلى المواقع غير الموثوقة من خلال تصفية الويب وضوابط البروكسي
3. تفعيل الوضع المحمي المحسّن (EPM) في IE إذا لم يكن الترحيل ممكناً فوراً
4. تنفيذ تجزئة الشبكة لعزل الأنظمة التي لا تزال تتطلب IE

إرشادات التصحيح:
5. تطبيق نشرة مايكروسوفت الأمنية MS15-018 فوراً على جميع تثبيتات IE
6. إعطاء الأولوية للتصحيح للأنظمة المتصلة بالإنترنت والتي تعالج بيانات حساسة
7. التحقق من نشر التصحيح عبر WSUS أو SCCM أو أدوات إدارة نقاط النهاية

استراتيجية الترحيل:
8. تسريع الترحيل إلى Microsoft Edge أو المتصفحات الحديثة (Chrome، Firefox)
9. استخدام وضع IE في Edge لتوافق التطبيقات القديمة
10. تعطيل إنترنت إكسبلورر تماماً حيث لا يكون مطلوباً للعمليات التجارية

الضوابط التعويضية:
11. نشر مجموعة أدوات تجربة التخفيف المحسّنة (EMET) على الأنظمة التي لا يمكن تصحيحها فوراً
12. تنفيذ القائمة البيضاء للتطبيقات لمنع تنفيذ التعليمات البرمجية غير المصرح بها
13. تفعيل Windows Defender Exploit Guard على أنظمة Windows 10+

الكشف:
14. مراقبة سلوك عملية IE المشبوه باستخدام حلول EDR
15. التنبيه عند وصول IE إلى مناطق ذاكرة غير عادية أو إنشاء عمليات فرعية غير متوقعة
16. مراجعة سجلات بروكسي الويب للاتصالات بنطاقات مجموعات الاستغلال المعروفة
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
5-1-1: Vulnerability Management 5-1-2: Patch Management 4-1-1: Secure System Configuration 4-2-1: Network Security Controls 6-1-1: Security Monitoring and Analysis
🔵 SAMA CSF
TRM-01: Technology Risk Management CYB-01: Cybersecurity Framework CYB-04: Vulnerability and Patch Management CYB-06: Security Monitoring and Incident Response
🟡 ISO 27001:2022
A.12.6.1: Management of Technical Vulnerabilities A.12.2.1: Controls Against Malware A.13.1.1: Network Controls A.12.6.2: Restrictions on Software Installation
🟣 PCI DSS v4.0
6.2: Ensure all systems are protected from known vulnerabilities 6.6: Protect web-facing applications 11.2: Run internal and external network vulnerability scans
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Microsoft:Internet Explorer
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS38.67%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-06-15
Published 2022-05-25
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
8.7
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.