Lucene search

K
cve[email protected]CVE-2018-8449
HistorySep 13, 2018 - 12:29 a.m.

CVE-2018-8449

2018-09-1300:29:05
CWE-367
web.nvd.nist.gov
80
cve-2018-8449
device guard
security feature bypass
windows server 2016
windows 10
nvd

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:L/Au:N/C:N/I:P/A:N

3.3 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

5.3 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

26.2%

A security feature bypass exists when Device Guard incorrectly validates an untrusted file, aka “Device Guard Security Feature Bypass Vulnerability.” This affects Windows Server 2016, Windows 10, Windows 10 Servers.

Affected configurations

Vulners
NVD
Node
microsoftwindows_server_2016Match(Server Core installation)
OR
microsoftwindows_10Match32-bit Systems
OR
microsoftwindows_10MatchVersion 1607 for 32-bit Systems
OR
microsoftwindows_10MatchVersion 1607 for x64-based Systems
OR
microsoftwindows_10MatchVersion 1703 for 32-bit Systems
OR
microsoftwindows_10MatchVersion 1703 for x64-based Systems
OR
microsoftwindows_10MatchVersion 1709 for 32-bit Systems
OR
microsoftwindows_10MatchVersion 1709 for x64-based Systems
OR
microsoftwindows_10MatchVersion 1803 for 32-bit Systems
OR
microsoftwindows_10MatchVersion 1803 for x64-based Systems
OR
microsoftwindows_10Matchx64-based Systems
OR
microsoftwindows_10
OR
microsoftwindows_10
VendorProductVersionCPE
microsoftwindows_server_2016(Server Core installation)cpe:2.3:o:microsoft:windows_server_2016:(Server Core installation):*:*:*:*:*:*:*
microsoftwindows_1032-bit Systemscpe:2.3:o:microsoft:windows_10:32-bit Systems:*:*:*:*:*:*:*
microsoftwindows_10Version 1607 for 32-bit Systemscpe:2.3:o:microsoft:windows_10:Version 1607 for 32-bit Systems:*:*:*:*:*:*:*
microsoftwindows_10Version 1607 for x64-based Systemscpe:2.3:o:microsoft:windows_10:Version 1607 for x64-based Systems:*:*:*:*:*:*:*
microsoftwindows_10Version 1703 for 32-bit Systemscpe:2.3:o:microsoft:windows_10:Version 1703 for 32-bit Systems:*:*:*:*:*:*:*
microsoftwindows_10Version 1703 for x64-based Systemscpe:2.3:o:microsoft:windows_10:Version 1703 for x64-based Systems:*:*:*:*:*:*:*
microsoftwindows_10Version 1709 for 32-bit Systemscpe:2.3:o:microsoft:windows_10:Version 1709 for 32-bit Systems:*:*:*:*:*:*:*
microsoftwindows_10Version 1709 for x64-based Systemscpe:2.3:o:microsoft:windows_10:Version 1709 for x64-based Systems:*:*:*:*:*:*:*
microsoftwindows_10Version 1803 for 32-bit Systemscpe:2.3:o:microsoft:windows_10:Version 1803 for 32-bit Systems:*:*:*:*:*:*:*
microsoftwindows_10Version 1803 for x64-based Systemscpe:2.3:o:microsoft:windows_10:Version 1803 for x64-based Systems:*:*:*:*:*:*:*
Rows per page:
1-10 of 131

CNA Affected

[
  {
    "product": "Windows Server 2016",
    "vendor": "Microsoft",
    "versions": [
      {
        "status": "affected",
        "version": "(Server Core installation)"
      }
    ]
  },
  {
    "product": "Windows 10",
    "vendor": "Microsoft",
    "versions": [
      {
        "status": "affected",
        "version": "32-bit Systems"
      },
      {
        "status": "affected",
        "version": "Version 1607 for 32-bit Systems"
      },
      {
        "status": "affected",
        "version": "Version 1607 for x64-based Systems"
      },
      {
        "status": "affected",
        "version": "Version 1703 for 32-bit Systems"
      },
      {
        "status": "affected",
        "version": "Version 1703 for x64-based Systems"
      },
      {
        "status": "affected",
        "version": "Version 1709 for 32-bit Systems"
      },
      {
        "status": "affected",
        "version": "Version 1709 for x64-based Systems"
      },
      {
        "status": "affected",
        "version": "Version 1803 for 32-bit Systems"
      },
      {
        "status": "affected",
        "version": "Version 1803 for x64-based Systems"
      },
      {
        "status": "affected",
        "version": "x64-based Systems"
      }
    ]
  },
  {
    "product": "Windows 10 Servers",
    "vendor": "Microsoft",
    "versions": [
      {
        "status": "affected",
        "version": "version 1709  (Server Core Installation)"
      },
      {
        "status": "affected",
        "version": "version 1803  (Server Core Installation)"
      }
    ]
  }
]

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:L/Au:N/C:N/I:P/A:N

3.3 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

5.3 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

26.2%