INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Information Technology HIGH 1h Global data_breach Government CRITICAL 10h Global ransomware Financial Services / Cybersecurity CRITICAL 11h Global vulnerability Information Technology / Cybersecurity CRITICAL 13h Global malware Energy and Utilities CRITICAL 14h Global ransomware Multiple sectors CRITICAL 14h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 16h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 17h Global phishing Multiple sectors HIGH 17h Global insider Cybersecurity Services CRITICAL 18h Global vulnerability Information Technology HIGH 1h Global data_breach Government CRITICAL 10h Global ransomware Financial Services / Cybersecurity CRITICAL 11h Global vulnerability Information Technology / Cybersecurity CRITICAL 13h Global malware Energy and Utilities CRITICAL 14h Global ransomware Multiple sectors CRITICAL 14h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 16h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 17h Global phishing Multiple sectors HIGH 17h Global insider Cybersecurity Services CRITICAL 18h Global vulnerability Information Technology HIGH 1h Global data_breach Government CRITICAL 10h Global ransomware Financial Services / Cybersecurity CRITICAL 11h Global vulnerability Information Technology / Cybersecurity CRITICAL 13h Global malware Energy and Utilities CRITICAL 14h Global ransomware Multiple sectors CRITICAL 14h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 16h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 17h Global phishing Multiple sectors HIGH 17h Global insider Cybersecurity Services CRITICAL 18h
Vulnerabilities

CVE-2017-0059

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Microsoft Internet Explorer Information Disclosure Vulnerability — Microsoft Internet Explorer allow remote attackers to obtain sensitive information from process memory via a crafted web site.
Published: Mar 28, 2022  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Microsoft Internet Explorer Information Disclosure Vulnerability — Microsoft Internet Explorer allow remote attackers to obtain sensitive information from process memory via a crafted web site.

🤖 AI Executive Summary

CVE-2017-0059 is a critical information disclosure vulnerability in Microsoft Internet Explorer that allows remote attackers to obtain sensitive information from process memory by luring victims to a crafted website. With a CVSS score of 9.0 and publicly available exploits, this vulnerability poses a significant risk to organizations still using legacy Internet Explorer. The vulnerability can leak sensitive data from memory, potentially exposing credentials, session tokens, or other confidential information. Immediate patching is essential as active exploitation is feasible.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 7, 2026 00:17
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability is particularly concerning for Saudi organizations that still rely on legacy Internet Explorer for internal web applications, which is common in government agencies (NCA-regulated entities), banking institutions (SAMA-regulated), and healthcare systems. Many Saudi government portals and enterprise applications historically required Internet Explorer compatibility. Energy sector organizations including ARAMCO and its contractors, as well as telecom providers like STC, may have legacy systems dependent on IE. The information disclosure nature of this vulnerability could lead to credential theft and lateral movement within critical Saudi infrastructure networks.
🏢 Affected Saudi Sectors
Government Banking Healthcare Energy Telecom Education Defense
⚖️ Saudi Risk Score (AI)
7.8
/ 10.0
🔧 Remediation Steps (English)
Immediate Actions:
1. Apply Microsoft security update MS17-006 or the corresponding cumulative update for Internet Explorer immediately.
2. Audit all endpoints to identify systems still running Internet Explorer and prioritize patching.
3. Migrate users from Internet Explorer to modern browsers (Microsoft Edge, Chrome, Firefox) where possible.

Compensating Controls:
1. Implement web content filtering to block access to known malicious domains.
2. Enable Enhanced Protected Mode in Internet Explorer as a temporary mitigation.
3. Configure Internet Explorer security zones to restrict active scripting on untrusted sites.
4. Deploy network-level IDS/IPS signatures to detect exploitation attempts.
5. Use application whitelisting to prevent unauthorized code execution.

Detection Rules:
1. Monitor for unusual memory access patterns from iexplore.exe processes.
2. Alert on Internet Explorer accessing suspicious or newly registered domains.
3. Implement YARA rules for known exploit payloads targeting this CVE.
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تطبيق تحديث الأمان من Microsoft رقم MS17-006 أو التحديث التراكمي المقابل لـ Internet Explorer فوراً.
2. مراجعة جميع الأجهزة لتحديد الأنظمة التي لا تزال تشغل Internet Explorer وتحديد أولويات التصحيح.
3. نقل المستخدمين من Internet Explorer إلى متصفحات حديثة (Microsoft Edge أو Chrome أو Firefox) حيثما أمكن.

الضوابط التعويضية:
1. تنفيذ تصفية محتوى الويب لحظر الوصول إلى النطاقات الضارة المعروفة.
2. تمكين وضع الحماية المحسّن في Internet Explorer كإجراء مؤقت.
3. تكوين مناطق أمان Internet Explorer لتقييد البرمجة النشطة على المواقع غير الموثوقة.
4. نشر توقيعات IDS/IPS على مستوى الشبكة للكشف عن محاولات الاستغلال.
5. استخدام القوائم البيضاء للتطبيقات لمنع تنفيذ التعليمات البرمجية غير المصرح بها.

قواعد الكشف:
1. مراقبة أنماط الوصول غير العادية للذاكرة من عمليات iexplore.exe.
2. التنبيه عند وصول Internet Explorer إلى نطاقات مشبوهة أو مسجلة حديثاً.
3. تنفيذ قواعد YARA لحمولات الاستغلال المعروفة التي تستهدف هذه الثغرة.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
2-3-1 (Patch Management) 2-5-1 (Vulnerability Management) 2-2-1 (Asset Management) 2-6-1 (Network Security)
🔵 SAMA CSF
3.3.3 (Patch Management) 3.3.4 (Vulnerability Management) 3.1.1 (Cyber Security Risk Management) 3.3.7 (Web Security)
🟡 ISO 27001:2022
A.8.8 (Management of technical vulnerabilities) A.8.9 (Configuration management) A.8.23 (Web filtering) A.8.7 (Protection against malware)
🟣 PCI DSS v4.0
6.3.3 (Install critical security patches within one month) 6.2 (Protect system components from known vulnerabilities) 11.3 (Penetration testing)
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Microsoft:Internet Explorer
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS85.19%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-04-18
Published 2022-03-28
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
7.8
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.