Hallo Ingo,
ich hatte dieses Problem bereits am 27. April hier im Forum gemeldet und damals in meinem Beitrag dazu bereits eine Antwort von dir erhalten. Danke nochmal dafür :)
Microsoft hatte mich damals gebeten, meine öffentlichen Beiträge zu dem Thema zu löschen.
Link zum Beitrag vom 27.04 (mit dem Versuch diesen zu löschen): https://answers.microsoft.com/de-de/windows/forum/apps_windows_10-win_news/achtung-microsoft-windows-10-apps-%C3%B6ffnen/185f0528-9897-48e6-8b85-2d2a48315eca?tm=1556319207597
Ich hatte dieses Problem damals (am 29.04.) dem Microsoft Security Response Center gemeldet (https://msrc.microsoft.com/).
Die offizielle Antwort war die folgende (vom 08.05.):
We can’t reproduce this one, likely because the malicious ad has already been removed. But going by the Youtube video, this allows an attacker to get a website to pop up on the victim’s machine in their default browser with zero user interaction. The News app that this attack is launched from is AppContainer.
Although this behavior is not ideal, it would still require the attacker to exploit an additional bug in order to do something meaningful to the victim. They would need something like a browser RCE to gain code execution or some XSS attack to steal information. In the PoC video, the malicious website that pops up attempts to social engineer the victim into downloading and running a malicious executable.
Because this bug alone is not enough for a full attack, unfortunately, the report doesn't meet the bar for servicing with a hotfix and will proceed with closing out the case.
Nachdem das Problem immer wiederkehrend ist, hatte ich den entsprechenden Mitarbeiter nochmal darauf angesprochen.
Folgende Antwort (vom 31.05.):
Even though it doesn't meet the bar we did open vNext bugs for your report. Hopefully the product team will service the issue in the near future.
Das ist alles was ich dazu aktuell hab.