INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global ransomware Financial Services / Cybersecurity CRITICAL 23m Global vulnerability Information Technology / Cybersecurity CRITICAL 2h Global malware Energy and Utilities CRITICAL 2h Global ransomware Multiple sectors CRITICAL 3h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 5h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 6h Global phishing Multiple sectors HIGH 6h Global insider Cybersecurity Services CRITICAL 6h Global ransomware Multiple sectors (U.S. companies) CRITICAL 7h Global malware Financial Services, Cryptocurrency CRITICAL 7h Global ransomware Financial Services / Cybersecurity CRITICAL 23m Global vulnerability Information Technology / Cybersecurity CRITICAL 2h Global malware Energy and Utilities CRITICAL 2h Global ransomware Multiple sectors CRITICAL 3h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 5h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 6h Global phishing Multiple sectors HIGH 6h Global insider Cybersecurity Services CRITICAL 6h Global ransomware Multiple sectors (U.S. companies) CRITICAL 7h Global malware Financial Services, Cryptocurrency CRITICAL 7h Global ransomware Financial Services / Cybersecurity CRITICAL 23m Global vulnerability Information Technology / Cybersecurity CRITICAL 2h Global malware Energy and Utilities CRITICAL 2h Global ransomware Multiple sectors CRITICAL 3h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 5h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 6h Global phishing Multiple sectors HIGH 6h Global insider Cybersecurity Services CRITICAL 6h Global ransomware Multiple sectors (U.S. companies) CRITICAL 7h Global malware Financial Services, Cryptocurrency CRITICAL 7h
Vulnerabilities

CVE-2010-2568

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Microsoft Windows LNK Remote Code Execution Vulnerability (Stuxnet)
Published: Sep 15, 2022  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Microsoft Windows Remote Code Execution Vulnerability — Microsoft Windows incorrectly parses shortcuts in such a way that malicious code may be executed when the operating system displays the icon of a malicious shortcut file. An attacker who successfully exploited this vulnerability could execute code as the logged-on user.

🤖 AI Executive Summary

CVE-2010-2568 is a critical vulnerability in Windows shortcut (.LNK) file handling that allows remote code execution when displaying malicious shortcut icons. This zero-day was famously exploited by the Stuxnet worm and enables attackers to execute arbitrary code with user privileges without user interaction beyond viewing a folder containing the malicious shortcut.

📄 Description (Arabic)

تتيح هذه الثغرة الأمنية الحرجة للمهاجمين تنفيذ تعليمات برمجية ضارة من خلال استغلال خلل في طريقة معالجة نظام ويندوز لملفات الاختصارات (.LNK). يحدث التنفيذ التلقائي للكود الضار عندما يعرض النظام أيقونة ملف الاختصار المصاب، حتى دون فتح الملف نفسه. تم استخدام هذه الثغرة في هجمات ستكسنت المتطورة التي استهدفت البنية التحتية الحيوية. يمكن نشر الثغرة عبر وسائط USB أو مشاركات الشبكة، مما يجعلها خطيرة بشكل خاص في البيئات المعزولة عن الإنترنت.

🤖 ملخص تنفيذي (AI)

الثغرة CVE-2010-2568 هي ثغرة حرجة في معالجة ملفات الاختصارات (.LNK) في ويندوز تسمح بتنفيذ التعليمات البرمجية عن بُعد عند عرض أيقونات الاختصارات الضارة. تم استغلال هذه الثغرة بشكل شهير من قبل دودة ستكسنت وتمكن المهاجمين من تنفيذ تعليمات برمجية عشوائية بصلاحيات المستخدم دون تفاعل من المستخدم سوى عرض مجلد يحتوي على الاختصار الضار.

🤖 AI Intelligence Analysis Analyzed: Feb 28, 2026 09:03
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations, particularly critical infrastructure operators in energy, utilities, and government sectors, face severe risk from this vulnerability as it enables air-gapped network penetration via USB devices. The exploit's use in Stuxnet demonstrates its effectiveness against industrial control systems and SCADA environments prevalent in Saudi Arabia's oil, gas, and petrochemical facilities.
🏢 Affected Saudi Sectors
النفط والغاز الطاقة والمرافق البتروكيماويات القطاع الحكومي البنية التحتية الحيوية الصناعات التحويلية المياه والصرف الصحي
⚖️ Saudi Risk Score (AI)
9.0
/ 10.0
🔧 Remediation Steps (English)
1. Immediately apply Microsoft Security Bulletin MS10-046 patch to all Windows systems, prioritizing critical infrastructure and industrial control systems with air-gapped networks that may have been exposed to removable media
2. Implement strict USB device control policies using Group Policy or endpoint protection solutions to disable AutoRun features and restrict removable media usage, especially in OT/ICS environments
3. Deploy network segmentation and enhanced monitoring for .LNK file creation and execution, establish incident response procedures for suspected Stuxnet-variant infections, and conduct forensic analysis of any systems showing anomalous shortcut file behavior
🔧 خطوات المعالجة (العربية)
1. تطبيق تحديث الأمان من مايكروسوفت MS10-046 فوراً على جميع أنظمة ويندوز، مع إعطاء الأولوية للبنية التحتية الحيوية وأنظمة التحكم الصناعية ذات الشبكات المعزولة التي قد تكون تعرضت لوسائط قابلة للإزالة
2. تنفيذ سياسات صارمة للتحكم في أجهزة USB باستخدام نهج المجموعة أو حلول حماية نقاط النهاية لتعطيل ميزات التشغيل التلقائي وتقييد استخدام الوسائط القابلة للإزالة، خاصة في بيئات التكنولوجيا التشغيلية وأنظمة التحكم الصناعية
3. نشر تجزئة الشبكة والمراقبة المعززة لإنشاء وتنفيذ ملفات .LNK، وإنشاء إجراءات الاستجابة للحوادث للإصابات المشتبه بها بمتغيرات ستكسنت، وإجراء تحليل جنائي لأي أنظمة تظهر سلوكاً شاذاً في ملفات الاختصارات
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-1-2 ECC-2-1 ECC-3-1 ECC-4-1 ECC-5-2
🔵 SAMA CSF
CCC-1.1 CCC-2.2 CCC-3.1 CCC-4.3 CCC-6.1
🟡 ISO 27001:2022
A.12.6.1 A.12.2.1 A.8.2.3 A.13.1.1
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Microsoft:Windows
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS92.13%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-10-06
Published 2022-09-15
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.0
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.