Lucene search

K
cve[email protected]CVE-2018-8222
HistoryJul 11, 2018 - 12:29 a.m.

CVE-2018-8222

2018-07-1100:29:00
web.nvd.nist.gov
72
security
feature bypass
vulnerability
device guard
windows server 2016
windows 10
windows 10 servers
nvd
cve-2018-8222

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

5.3 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

6.6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

24.1%

A security feature bypass vulnerability exists in Device Guard that could allow an attacker to inject malicious code into a Windows PowerShell session, aka “Device Guard Code Integrity Policy Security Feature Bypass Vulnerability.” This affects Windows Server 2016, Windows 10, Windows 10 Servers.

Affected configurations

Vulners
NVD
Node
microsoftwindows_server_2016Match(Server Core installation)
OR
microsoftwindows_10Match32-bit Systems
OR
microsoftwindows_10MatchVersion 1607 for 32-bit Systems
OR
microsoftwindows_10MatchVersion 1607 for x64-based Systems
OR
microsoftwindows_10MatchVersion 1703 for 32-bit Systems
OR
microsoftwindows_10MatchVersion 1703 for x64-based Systems
OR
microsoftwindows_10MatchVersion 1709 for 32-bit Systems
OR
microsoftwindows_10MatchVersion 1709 for x64-based Systems
OR
microsoftwindows_10MatchVersion 1803 for 32-bit Systems
OR
microsoftwindows_10MatchVersion 1803 for x64-based Systems
OR
microsoftwindows_10Matchx64-based Systems
OR
microsoftwindows_10
OR
microsoftwindows_10
VendorProductVersionCPE
microsoftwindows_server_2016(Server Core installation)cpe:2.3:o:microsoft:windows_server_2016:(Server Core installation):*:*:*:*:*:*:*
microsoftwindows_1032-bit Systemscpe:2.3:o:microsoft:windows_10:32-bit Systems:*:*:*:*:*:*:*
microsoftwindows_10Version 1607 for 32-bit Systemscpe:2.3:o:microsoft:windows_10:Version 1607 for 32-bit Systems:*:*:*:*:*:*:*
microsoftwindows_10Version 1607 for x64-based Systemscpe:2.3:o:microsoft:windows_10:Version 1607 for x64-based Systems:*:*:*:*:*:*:*
microsoftwindows_10Version 1703 for 32-bit Systemscpe:2.3:o:microsoft:windows_10:Version 1703 for 32-bit Systems:*:*:*:*:*:*:*
microsoftwindows_10Version 1703 for x64-based Systemscpe:2.3:o:microsoft:windows_10:Version 1703 for x64-based Systems:*:*:*:*:*:*:*
microsoftwindows_10Version 1709 for 32-bit Systemscpe:2.3:o:microsoft:windows_10:Version 1709 for 32-bit Systems:*:*:*:*:*:*:*
microsoftwindows_10Version 1709 for x64-based Systemscpe:2.3:o:microsoft:windows_10:Version 1709 for x64-based Systems:*:*:*:*:*:*:*
microsoftwindows_10Version 1803 for 32-bit Systemscpe:2.3:o:microsoft:windows_10:Version 1803 for 32-bit Systems:*:*:*:*:*:*:*
microsoftwindows_10Version 1803 for x64-based Systemscpe:2.3:o:microsoft:windows_10:Version 1803 for x64-based Systems:*:*:*:*:*:*:*
Rows per page:
1-10 of 131

CNA Affected

[
  {
    "product": "Windows Server 2016",
    "vendor": "Microsoft",
    "versions": [
      {
        "status": "affected",
        "version": "(Server Core installation)"
      }
    ]
  },
  {
    "product": "Windows 10",
    "vendor": "Microsoft",
    "versions": [
      {
        "status": "affected",
        "version": "32-bit Systems"
      },
      {
        "status": "affected",
        "version": "Version 1607 for 32-bit Systems"
      },
      {
        "status": "affected",
        "version": "Version 1607 for x64-based Systems"
      },
      {
        "status": "affected",
        "version": "Version 1703 for 32-bit Systems"
      },
      {
        "status": "affected",
        "version": "Version 1703 for x64-based Systems"
      },
      {
        "status": "affected",
        "version": "Version 1709 for 32-bit Systems"
      },
      {
        "status": "affected",
        "version": "Version 1709 for x64-based Systems"
      },
      {
        "status": "affected",
        "version": "Version 1803 for 32-bit Systems"
      },
      {
        "status": "affected",
        "version": "Version 1803 for x64-based Systems"
      },
      {
        "status": "affected",
        "version": "x64-based Systems"
      }
    ]
  },
  {
    "product": "Windows 10 Servers",
    "vendor": "Microsoft",
    "versions": [
      {
        "status": "affected",
        "version": "version 1709  (Server Core Installation)"
      },
      {
        "status": "affected",
        "version": "version 1803  (Server Core Installation)"
      }
    ]
  }
]

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

5.3 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

6.6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

24.1%