Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2010-2568
Deferred
More InfoOfficial Page
Source-secure@microsoft.com
View Known Exploited Vulnerability (KEV) details
Published At-22 Jul, 2010 | 05:43
Updated At-22 Oct, 2025 | 01:15

Windows Shell in Microsoft Windows XP SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 SP2 and R2, and Windows 7 allows local users or remote attackers to execute arbitrary code via a crafted (1) .LNK or (2) .PIF shortcut file, which is not properly handled during icon display in Windows Explorer, as demonstrated in the wild in July 2010, and originally reported for malware that leverages CVE-2010-2772 in Siemens WinCC SCADA systems.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
2022-09-152022-10-06Microsoft Windows Remote Code Execution VulnerabilityApply updates per vendor instructions.
Date Added: 2022-09-15
Due Date: 2022-10-06
Vulnerability Name: Microsoft Windows Remote Code Execution Vulnerability
Required Action: Apply updates per vendor instructions.
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Primary2.09.3HIGH
AV:N/AC:M/Au:N/C:C/I:C/A:C
Type: Secondary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 9.3
Base severity: HIGH
Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C
CPE Matches

Microsoft Corporation
microsoft
>>windows_7>>-
cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>windows_server_2003>>-
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>windows_server_2008>>-
cpe:2.3:o:microsoft:windows_server_2008:-:-:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>windows_server_2008>>-
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>windows_server_2008>>r2
cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:itanium:*
Microsoft Corporation
microsoft
>>windows_server_2008>>r2
cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*
Microsoft Corporation
microsoft
>>windows_vista>>-
cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>windows_vista>>-
cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>windows_xp>>-
cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*
Microsoft Corporation
microsoft
>>windows_xp>>-
cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-noinfoPrimarynvd@nist.gov
CWE ID: NVD-CWE-noinfo
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Per: http://www.microsoft.com/technet/security/advisory/2286198.mspx Microsoft has completed the investigation into a public report of this vulnerability. We have issued MS10-046 to address this issue. http://www.microsoft.com/technet/security/bulletin/MS10-046.mspx

Vendor Statements

References
HyperlinkSourceResource
http://isc.sans.edu/diary.html?storyid=9181secure@microsoft.com
Exploit
Issue Tracking
http://isc.sans.edu/diary.html?storyid=9190secure@microsoft.com
Issue Tracking
http://krebsonsecurity.com/2010/07/experts-warn-of-new-windows-shortcut-flaw/secure@microsoft.com
Press/Media Coverage
http://secunia.com/advisories/40647secure@microsoft.com
Vendor Advisory
http://securitytracker.com/id?1024216secure@microsoft.com
Broken Link
Third Party Advisory
VDB Entry
http://www.f-secure.com/weblog/archives/00001986.htmlsecure@microsoft.com
Not Applicable
http://www.f-secure.com/weblog/archives/new_rootkit_en.pdfsecure@microsoft.com
Exploit
http://www.kb.cert.org/vuls/id/940193secure@microsoft.com
Patch
Third Party Advisory
US Government Resource
http://www.microsoft.com/technet/security/advisory/2286198.mspxsecure@microsoft.com
Broken Link
Patch
Vendor Advisory
http://www.securityfocus.com/bid/41732secure@microsoft.com
Broken Link
Exploit
Third Party Advisory
VDB Entry
http://www.us-cert.gov/cas/techalerts/TA10-222A.htmlsecure@microsoft.com
Third Party Advisory
US Government Resource
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-046secure@microsoft.com
Patch
Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11564secure@microsoft.com
Broken Link
https://www.geoffchappell.com/notes/security/stuxnet/ctrlfldr.htmsecure@microsoft.com
Third Party Advisory
http://isc.sans.edu/diary.html?storyid=9181af854a3a-2127-422b-91ae-364da2661108
Exploit
Issue Tracking
http://isc.sans.edu/diary.html?storyid=9190af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
http://krebsonsecurity.com/2010/07/experts-warn-of-new-windows-shortcut-flaw/af854a3a-2127-422b-91ae-364da2661108
Press/Media Coverage
http://secunia.com/advisories/40647af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://securitytracker.com/id?1024216af854a3a-2127-422b-91ae-364da2661108
Broken Link
Third Party Advisory
VDB Entry
http://www.f-secure.com/weblog/archives/00001986.htmlaf854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://www.f-secure.com/weblog/archives/new_rootkit_en.pdfaf854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.kb.cert.org/vuls/id/940193af854a3a-2127-422b-91ae-364da2661108
Patch
Third Party Advisory
US Government Resource
http://www.microsoft.com/technet/security/advisory/2286198.mspxaf854a3a-2127-422b-91ae-364da2661108
Broken Link
Patch
Vendor Advisory
http://www.securityfocus.com/bid/41732af854a3a-2127-422b-91ae-364da2661108
Broken Link
Exploit
Third Party Advisory
VDB Entry
http://www.us-cert.gov/cas/techalerts/TA10-222A.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
US Government Resource
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-046af854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11564af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://www.geoffchappell.com/notes/security/stuxnet/ctrlfldr.htmaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2010-2568134c704f-9b21-4f2e-91b3-4a467353bcc0
N/A
Hyperlink: http://isc.sans.edu/diary.html?storyid=9181
Source: secure@microsoft.com
Resource:
Exploit
Issue Tracking
Hyperlink: http://isc.sans.edu/diary.html?storyid=9190
Source: secure@microsoft.com
Resource:
Issue Tracking
Hyperlink: http://krebsonsecurity.com/2010/07/experts-warn-of-new-windows-shortcut-flaw/
Source: secure@microsoft.com
Resource:
Press/Media Coverage
Hyperlink: http://secunia.com/advisories/40647
Source: secure@microsoft.com
Resource:
Vendor Advisory
Hyperlink: http://securitytracker.com/id?1024216
Source: secure@microsoft.com
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: http://www.f-secure.com/weblog/archives/00001986.html
Source: secure@microsoft.com
Resource:
Not Applicable
Hyperlink: http://www.f-secure.com/weblog/archives/new_rootkit_en.pdf
Source: secure@microsoft.com
Resource:
Exploit
Hyperlink: http://www.kb.cert.org/vuls/id/940193
Source: secure@microsoft.com
Resource:
Patch
Third Party Advisory
US Government Resource
Hyperlink: http://www.microsoft.com/technet/security/advisory/2286198.mspx
Source: secure@microsoft.com
Resource:
Broken Link
Patch
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/41732
Source: secure@microsoft.com
Resource:
Broken Link
Exploit
Third Party Advisory
VDB Entry
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA10-222A.html
Source: secure@microsoft.com
Resource:
Third Party Advisory
US Government Resource
Hyperlink: https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-046
Source: secure@microsoft.com
Resource:
Patch
Vendor Advisory
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11564
Source: secure@microsoft.com
Resource:
Broken Link
Hyperlink: https://www.geoffchappell.com/notes/security/stuxnet/ctrlfldr.htm
Source: secure@microsoft.com
Resource:
Third Party Advisory
Hyperlink: http://isc.sans.edu/diary.html?storyid=9181
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Issue Tracking
Hyperlink: http://isc.sans.edu/diary.html?storyid=9190
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: http://krebsonsecurity.com/2010/07/experts-warn-of-new-windows-shortcut-flaw/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Press/Media Coverage
Hyperlink: http://secunia.com/advisories/40647
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://securitytracker.com/id?1024216
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: http://www.f-secure.com/weblog/archives/00001986.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: http://www.f-secure.com/weblog/archives/new_rootkit_en.pdf
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Hyperlink: http://www.kb.cert.org/vuls/id/940193
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Third Party Advisory
US Government Resource
Hyperlink: http://www.microsoft.com/technet/security/advisory/2286198.mspx
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Patch
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/41732
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Exploit
Third Party Advisory
VDB Entry
Hyperlink: http://www.us-cert.gov/cas/techalerts/TA10-222A.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
US Government Resource
Hyperlink: https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-046
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Vendor Advisory
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11564
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: https://www.geoffchappell.com/notes/security/stuxnet/ctrlfldr.htm
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2010-2568
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Resource: N/A
Change History
0Changes found

Details not found