I think the key here prob. is the attack vector - MSRC prob. think “double-clicking on a non-MOTW local mht file” isn’t a valid vector, as there maybe bigger/known problems if you open non-MOTW mht file locally with IE.https://twitter.com/wdormann/status/1116691419673047042 …
-
-
Okay, that's weird.. I just got a test (didn't actually test yesterday). The weird thing is that I found that on Windows 10 the MoTW is a NOT vector (same as ur test), but on Windows 7 it is - if MoTW, then only the datatears.xml will be downloaded but no system.ini leaking.
-
Yes, with Windows 7 and Windows 8, the MoTW appears to prevent the data from being sent to the attacker. With Windows 10, the MoTW makes no difference. Conclusion: In this particular case, Windows 10 is worse off than prior versions of Windows.
- 5 more replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.