INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global ransomware Financial Services / Cybersecurity CRITICAL 54m Global vulnerability Information Technology / Cybersecurity CRITICAL 2h Global malware Energy and Utilities CRITICAL 3h Global ransomware Multiple sectors CRITICAL 3h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 6h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 6h Global phishing Multiple sectors HIGH 7h Global insider Cybersecurity Services CRITICAL 7h Global ransomware Multiple sectors (U.S. companies) CRITICAL 7h Global malware Financial Services, Cryptocurrency CRITICAL 8h Global ransomware Financial Services / Cybersecurity CRITICAL 54m Global vulnerability Information Technology / Cybersecurity CRITICAL 2h Global malware Energy and Utilities CRITICAL 3h Global ransomware Multiple sectors CRITICAL 3h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 6h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 6h Global phishing Multiple sectors HIGH 7h Global insider Cybersecurity Services CRITICAL 7h Global ransomware Multiple sectors (U.S. companies) CRITICAL 7h Global malware Financial Services, Cryptocurrency CRITICAL 8h Global ransomware Financial Services / Cybersecurity CRITICAL 54m Global vulnerability Information Technology / Cybersecurity CRITICAL 2h Global malware Energy and Utilities CRITICAL 3h Global ransomware Multiple sectors CRITICAL 3h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 6h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 6h Global phishing Multiple sectors HIGH 7h Global insider Cybersecurity Services CRITICAL 7h Global ransomware Multiple sectors (U.S. companies) CRITICAL 7h Global malware Financial Services, Cryptocurrency CRITICAL 8h
Vulnerabilities

CVE-2018-8653

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability — Microsoft Internet Explorer contains a memory corruption vulnerability due to how the Scripting Engine handles objects in
Published: Nov 3, 2021  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability — Microsoft Internet Explorer contains a memory corruption vulnerability due to how the Scripting Engine handles objects in memory, leading to remote code execution.

🤖 AI Executive Summary

CVE-2018-8653 is a critical memory corruption vulnerability in Microsoft Internet Explorer's Scripting Engine that enables remote code execution. An attacker can exploit this flaw by enticing a user to visit a malicious webpage, resulting in full system compromise with the privileges of the logged-in user. This vulnerability has a confirmed public exploit available, significantly elevating the risk of active exploitation in the wild. Organizations still running Internet Explorer — particularly in legacy enterprise environments — face immediate and severe risk.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 12, 2026 00:52
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations across multiple critical sectors remain exposed due to widespread legacy system usage. Government entities under NCA oversight and ARAMCO/energy sector operations often maintain legacy Windows environments with Internet Explorer for internal portals and SCADA HMI interfaces. SAMA-regulated banking institutions may still run IE-dependent banking applications and intranet systems. Healthcare organizations using older clinical systems and government hospitals under MOH are particularly vulnerable. Telecom operators like STC with large internal enterprise networks face lateral movement risks if endpoints are compromised. The availability of a public exploit makes this a prime candidate for targeted spear-phishing campaigns against Saudi critical infrastructure, consistent with threat actor patterns observed in the region (e.g., OilRig/APT34 activity targeting Saudi entities).
🏢 Affected Saudi Sectors
Government Banking Energy Healthcare Telecom Defense Education Manufacturing
⚖️ Saudi Risk Score (AI)
9.2
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Apply Microsoft Security Update KB4483187 (or the applicable cumulative update for your IE/Windows version) immediately — released December 2018 out-of-band.
2. Identify all systems running Internet Explorer via asset inventory and prioritize patching based on internet-facing exposure.
3. Restrict or disable Internet Explorer on all systems where it is not operationally required using Group Policy (set 'Disable Internet Explorer' via GPO).

PATCHING GUIDANCE:
4. Apply the December 2018 out-of-band security update from Microsoft Update Catalog for all supported Windows versions (Windows 7, 8.1, 10, Server 2008 R2, 2012, 2016, 2019).
5. Verify patch deployment using WSUS, SCCM, or equivalent patch management tools.

COMPENSATING CONTROLS (if patching is delayed):
6. Block access to untrusted external websites via web proxy/firewall for systems running IE.
7. Enable Enhanced Protected Mode (EPM) in Internet Explorer settings.
8. Set Internet Zone security to 'High' in IE settings to restrict script execution.
9. Deploy Microsoft EMET or Windows Defender Exploit Guard to mitigate memory corruption exploitation.
10. Restrict JScript.dll execution via AppLocker or Software Restriction Policies.

DETECTION RULES:
11. Monitor for anomalous iexplore.exe child processes (e.g., cmd.exe, powershell.exe, wscript.exe spawned by iexplore.exe).
12. Enable and review Windows Event Logs for process creation events (Event ID 4688) with iexplore.exe as parent.
13. Deploy YARA/Snort rules targeting known exploit payloads for CVE-2018-8653.
14. Monitor network traffic for connections to known malicious domains initiated by iexplore.exe.
15. Alert on JScript engine crashes or heap spray patterns in memory forensics tools.
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تطبيق تحديث Microsoft الأمني KB4483187 (أو التحديث التراكمي المناسب لإصدار IE/Windows لديك) فوراً — تم إصداره في ديسمبر 2018 خارج الجدول الزمني المعتاد.
2. تحديد جميع الأنظمة التي تعمل بمتصفح Internet Explorer عبر جرد الأصول وتحديد أولويات التصحيح بناءً على مستوى التعرض للإنترنت.
3. تقييد أو تعطيل Internet Explorer على جميع الأنظمة التي لا تحتاجه تشغيلياً باستخدام Group Policy.

إرشادات التصحيح:
4. تطبيق تحديث الأمان الاستثنائي لديسمبر 2018 من Microsoft Update Catalog لجميع إصدارات Windows المدعومة.
5. التحقق من نشر التصحيح باستخدام WSUS أو SCCM أو أدوات إدارة التصحيح المعادلة.

ضوابط التعويض (في حال تأخر التصحيح):
6. حظر الوصول إلى المواقع الخارجية غير الموثوقة عبر وكيل الويب/جدار الحماية للأنظمة التي تعمل بـ IE.
7. تفعيل وضع الحماية المحسّن (EPM) في إعدادات Internet Explorer.
8. ضبط مستوى أمان منطقة الإنترنت على 'عالٍ' في إعدادات IE لتقييد تنفيذ البرامج النصية.
9. نشر Microsoft EMET أو Windows Defender Exploit Guard للتخفيف من استغلال تلف الذاكرة.
10. تقييد تنفيذ JScript.dll عبر AppLocker أو سياسات تقييد البرامج.

قواعد الكشف:
11. مراقبة العمليات الفرعية الشاذة لـ iexplore.exe (مثل cmd.exe أو powershell.exe المُشغَّلة من iexplore.exe).
12. تفعيل ومراجعة سجلات أحداث Windows لأحداث إنشاء العمليات (Event ID 4688) مع iexplore.exe كعملية أصل.
13. نشر قواعد YARA/Snort التي تستهدف حمولات الاستغلال المعروفة لـ CVE-2018-8653.
14. مراقبة حركة الشبكة للاتصالات بالنطاقات الخبيثة المعروفة المُبدأة من iexplore.exe.
15. التنبيه على أعطال محرك JScript أو أنماط heap spray في أدوات الطب الشرعي للذاكرة.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-1-4-2: Patch and vulnerability management — critical patches must be applied within defined SLAs ECC-2-3-1: Secure configuration of endpoints and browsers ECC-2-5-1: Protection against malicious code and exploit techniques ECC-3-3-3: Web browsing controls and internet access restrictions ECC-1-3-1: Asset inventory and classification for vulnerability prioritization
🔵 SAMA CSF
Cyber Security Operations — Vulnerability Management domain Endpoint Security — secure browser configuration and patch compliance Threat Intelligence — monitoring for active exploitation of known CVEs Incident Management — response procedures for RCE vulnerabilities with public exploits Third-Party Risk — legacy application dependencies on Internet Explorer
🟡 ISO 27001:2022
A.8.8 — Management of technical vulnerabilities A.8.9 — Configuration management for secure browser settings A.8.7 — Protection against malware A.5.30 — ICT readiness for business continuity A.8.19 — Installation of software on operational systems
🟣 PCI DSS v4.0
Requirement 6.3.3 — All system components protected from known vulnerabilities by installing applicable security patches Requirement 6.2.4 — Software engineering techniques to prevent common vulnerabilities including memory corruption Requirement 5.2 — Anti-malware mechanisms to protect against known malware exploiting this vulnerability Requirement 12.3.2 — Targeted risk analysis for legacy browser usage in cardholder data environments
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Microsoft:Internet Explorer
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS22.99%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-05-03
Published 2021-11-03
Source Feed cisa_kev
Views 4
🇸🇦 Saudi Risk Score
9.2
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.