INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global phishing Multiple sectors HIGH 35m Global insider Cybersecurity Services CRITICAL 45m Global ransomware Multiple sectors (U.S. companies) CRITICAL 58m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h Global phishing Multiple sectors HIGH 35m Global insider Cybersecurity Services CRITICAL 45m Global ransomware Multiple sectors (U.S. companies) CRITICAL 58m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h Global phishing Multiple sectors HIGH 35m Global insider Cybersecurity Services CRITICAL 45m Global ransomware Multiple sectors (U.S. companies) CRITICAL 58m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h
Vulnerabilities

CVE-2023-36025

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Microsoft Windows SmartScreen Security Feature Bypass Vulnerability — Microsoft Windows SmartScreen contains a security feature bypass vulnerability that could allow an attacker to bypass Windows Defe
Published: Nov 14, 2023  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Microsoft Windows SmartScreen Security Feature Bypass Vulnerability — Microsoft Windows SmartScreen contains a security feature bypass vulnerability that could allow an attacker to bypass Windows Defender SmartScreen checks and their associated prompts.

🤖 AI Executive Summary

CVE-2023-36025 is a critical Windows SmartScreen security feature bypass vulnerability with a CVSS score of 9.0, actively exploited in the wild. Attackers can craft malicious Internet Shortcut (.url) files that bypass Windows Defender SmartScreen checks and associated security prompts, allowing malware to execute without user warnings. This vulnerability has been confirmed as exploited in zero-day attacks, making immediate patching essential. The ease of exploitation combined with active threat actor usage elevates this to a top-priority remediation item for all Windows environments.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 18, 2026 02:17
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations face significant risk given the widespread deployment of Windows across all critical sectors. Banking and financial institutions regulated by SAMA are at high risk as attackers can bypass endpoint security controls to deploy banking trojans or ransomware. Government entities under NCA oversight running Windows-based infrastructure are prime targets for nation-state actors exploiting this bypass to deliver espionage tools. Energy sector organizations including ARAMCO and its supply chain are at elevated risk given historical targeting by sophisticated threat actors. Telecom providers like STC and Zain face risk of credential-harvesting malware deployment. Healthcare organizations with limited security maturity are particularly vulnerable. The active exploitation status means Saudi SOCs should treat this as an ongoing incident response scenario rather than a routine patch cycle.
🏢 Affected Saudi Sectors
Banking Government Energy Healthcare Telecom Defense Education Retail
⚖️ Saudi Risk Score (AI)
9.4
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS (0-24 hours):
1. Apply Microsoft November 2023 Patch Tuesday update (KB5032189 for Windows 10/11, respective KB for Server editions) immediately across all Windows endpoints and servers.
2. Activate emergency patching procedures — do not wait for scheduled maintenance windows.
3. Isolate any systems that cannot be immediately patched using network segmentation.

DETECTION RULES:
4. Enable enhanced logging for SmartScreen events in Windows Event Log (Event ID 1001, 1002 under Microsoft-Windows-SmartScreen).
5. Monitor for suspicious .url file execution, especially from email attachments, downloads, or removable media.
6. Deploy YARA/Sigma rules to detect malicious .url files with embedded URLs pointing to WebDAV or UNC paths.
7. Search SIEM for process creation events where parent process is explorer.exe spawning unexpected child processes via .url files.

COMPENSATING CONTROLS (if patching is delayed):
8. Block .url file execution via AppLocker or Windows Defender Application Control (WDAC) policies.
9. Configure Group Policy to block .url files from being opened from untrusted locations.
10. Enable Attack Surface Reduction (ASR) rules, specifically rules blocking Office applications from creating child processes.
11. Restrict outbound SMB (port 445) and WebDAV traffic at perimeter and internal firewalls.
12. Deploy email gateway rules to strip or quarantine .url file attachments.

POST-PATCH VALIDATION:
13. Verify patch installation using WSUS/SCCM compliance reports.
14. Conduct threat hunting for indicators of compromise related to Phemedrone Stealer and other malware families exploiting this CVE.
15. Review EDR telemetry for any pre-patch exploitation attempts.
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية (خلال 0-24 ساعة):
1. تطبيق تحديث Microsoft لشهر نوفمبر 2023 (KB5032189 لنظام Windows 10/11 والإصدارات المقابلة للخوادم) فوراً على جميع نقاط النهاية والخوادم.
2. تفعيل إجراءات التصحيح الطارئة — لا تنتظر نوافذ الصيانة المجدولة.
3. عزل الأنظمة التي لا يمكن تصحيحها فوراً باستخدام تجزئة الشبكة.

قواعد الكشف:
4. تفعيل التسجيل المحسّن لأحداث SmartScreen في سجل أحداث Windows (معرف الحدث 1001، 1002).
5. مراقبة تنفيذ ملفات .url المشبوهة، خاصة من مرفقات البريد الإلكتروني أو التنزيلات أو الوسائط القابلة للإزالة.
6. نشر قواعد YARA/Sigma للكشف عن ملفات .url الخبيثة التي تحتوي على روابط تشير إلى مسارات WebDAV أو UNC.
7. البحث في SIEM عن أحداث إنشاء العمليات حيث تكون العملية الأصلية explorer.exe تولّد عمليات فرعية غير متوقعة.

ضوابط التعويض (في حالة تأخر التصحيح):
8. حظر تنفيذ ملفات .url عبر سياسات AppLocker أو Windows Defender Application Control.
9. تكوين Group Policy لحظر فتح ملفات .url من مواقع غير موثوقة.
10. تفعيل قواعد تقليل سطح الهجوم (ASR).
11. تقييد حركة مرور SMB الصادرة (المنفذ 445) وWebDAV على جدران الحماية.
12. نشر قواعد بوابة البريد الإلكتروني لحجب مرفقات ملفات .url أو عزلها.

التحقق بعد التصحيح:
13. التحقق من تثبيت التصحيح باستخدام تقارير امتثال WSUS/SCCM.
14. إجراء مطاردة التهديدات للبحث عن مؤشرات الاختراق المرتبطة بعائلات البرمجيات الخبيثة التي تستغل هذه الثغرة.
15. مراجعة بيانات EDR للبحث عن أي محاولات استغلال قبل التصحيح.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-1-4-2: Patch Management — Critical patches must be applied within defined SLAs ECC-2-3-1: Endpoint Protection — Ensuring endpoint security controls are not bypassed ECC-2-5-1: Malware Protection — Prevention of malware execution via security feature bypass ECC-3-3-2: Vulnerability Management — Timely remediation of critical vulnerabilities ECC-2-6-1: Email and Web Security — Filtering malicious content delivered via web shortcuts
🔵 SAMA CSF
Cybersecurity Operations — Vulnerability and Patch Management domain Cybersecurity Operations — Threat and Incident Management Endpoint Security — Ensuring integrity of endpoint protection mechanisms Identity and Access Management — Preventing unauthorized code execution Cybersecurity Risk Management — Assessment and treatment of critical vulnerabilities
🟡 ISO 27001:2022
A.8.8 — Management of technical vulnerabilities A.8.7 — Protection against malware A.8.19 — Installation of software on operational systems A.5.30 — ICT readiness for business continuity A.8.20 — Networks security controls
🟣 PCI DSS v4.0
Requirement 6.3.3 — All system components are protected from known vulnerabilities by installing applicable security patches Requirement 5.2 — Malicious software (malware) is prevented or detected and addressed Requirement 12.3.2 — Targeted risk analysis for critical vulnerabilities
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Microsoft:Windows
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS90.21%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2023-12-05
Published 2023-11-14
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.4
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.