|CVSS SCORE||4.7, (AV:L/AC:M/Au:N/C:C/I:N/A:N)|
The specific flaw exists within the IE broker process when processing a file name for reading in the routine IShdocvwBroker::MOTWCreateFileW. Using a directory junction and a symbolic link, code running inside the EPM AppContainer can read any file that the normal user account can read, bypassing the restrictions designed into EPM.
Microsoft has issued an update to correct this vulnerability. More details can be found at:
|CREDIT||Ashutosh Mehra (https://twitter.com/ashutoshmehra)