Lucene search

K
cve[email protected]CVE-2018-8492
HistoryOct 10, 2018 - 1:29 p.m.

CVE-2018-8492

2018-10-1013:29:03
web.nvd.nist.gov
74
5
cve-2018-8492
security
device guard
windows server 2016
windows 10
windows server 2019
powershell
nvd

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

5.3 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

6.2 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

24.1%

A security feature bypass vulnerability exists in Device Guard that could allow an attacker to inject malicious code into a Windows PowerShell session, aka “Device Guard Code Integrity Policy Security Feature Bypass Vulnerability.” This affects Windows Server 2016, Windows 10, Windows Server 2019, Windows 10 Servers.

Affected configurations

Vulners
NVD
Node
microsoftwindows_server_2016Match(Server Core installation)
OR
microsoftwindows_10MatchVersion 1607 for 32-bit Systems
OR
microsoftwindows_10MatchVersion 1607 for x64-based Systems
OR
microsoftwindows_10MatchVersion 1703 for 32-bit Systems
OR
microsoftwindows_10MatchVersion 1703 for x64-based Systems
OR
microsoftwindows_10MatchVersion 1709 for 32-bit Systems
OR
microsoftwindows_10MatchVersion 1709 for x64-based Systems
OR
microsoftwindows_10MatchVersion 1803 for 32-bit Systems
OR
microsoftwindows_10MatchVersion 1803 for x64-based Systems
OR
microsoftwindows_10MatchVersion 1809 for 32-bit Systems
OR
microsoftwindows_10MatchVersion 1809 for x64-based Systems
OR
microsoftwindows_server_2019Match(Server Core installation)
OR
microsoftwindows_10
OR
microsoftwindows_10
VendorProductVersionCPE
microsoftwindows_server_2016(Server Core installation)cpe:2.3:o:microsoft:windows_server_2016:(Server Core installation):*:*:*:*:*:*:*
microsoftwindows_10Version 1607 for 32-bit Systemscpe:2.3:o:microsoft:windows_10:Version 1607 for 32-bit Systems:*:*:*:*:*:*:*
microsoftwindows_10Version 1607 for x64-based Systemscpe:2.3:o:microsoft:windows_10:Version 1607 for x64-based Systems:*:*:*:*:*:*:*
microsoftwindows_10Version 1703 for 32-bit Systemscpe:2.3:o:microsoft:windows_10:Version 1703 for 32-bit Systems:*:*:*:*:*:*:*
microsoftwindows_10Version 1703 for x64-based Systemscpe:2.3:o:microsoft:windows_10:Version 1703 for x64-based Systems:*:*:*:*:*:*:*
microsoftwindows_10Version 1709 for 32-bit Systemscpe:2.3:o:microsoft:windows_10:Version 1709 for 32-bit Systems:*:*:*:*:*:*:*
microsoftwindows_10Version 1709 for x64-based Systemscpe:2.3:o:microsoft:windows_10:Version 1709 for x64-based Systems:*:*:*:*:*:*:*
microsoftwindows_10Version 1803 for 32-bit Systemscpe:2.3:o:microsoft:windows_10:Version 1803 for 32-bit Systems:*:*:*:*:*:*:*
microsoftwindows_10Version 1803 for x64-based Systemscpe:2.3:o:microsoft:windows_10:Version 1803 for x64-based Systems:*:*:*:*:*:*:*
microsoftwindows_10Version 1809 for 32-bit Systemscpe:2.3:o:microsoft:windows_10:Version 1809 for 32-bit Systems:*:*:*:*:*:*:*
Rows per page:
1-10 of 141

CNA Affected

[
  {
    "product": "Windows Server 2016",
    "vendor": "Microsoft",
    "versions": [
      {
        "status": "affected",
        "version": "(Server Core installation)"
      }
    ]
  },
  {
    "product": "Windows 10",
    "vendor": "Microsoft",
    "versions": [
      {
        "status": "affected",
        "version": "Version 1607 for 32-bit Systems"
      },
      {
        "status": "affected",
        "version": "Version 1607 for x64-based Systems"
      },
      {
        "status": "affected",
        "version": "Version 1703 for 32-bit Systems"
      },
      {
        "status": "affected",
        "version": "Version 1703 for x64-based Systems"
      },
      {
        "status": "affected",
        "version": "Version 1709 for 32-bit Systems"
      },
      {
        "status": "affected",
        "version": "Version 1709 for x64-based Systems"
      },
      {
        "status": "affected",
        "version": "Version 1803 for 32-bit Systems"
      },
      {
        "status": "affected",
        "version": "Version 1803 for x64-based Systems"
      },
      {
        "status": "affected",
        "version": "Version 1809 for 32-bit Systems"
      },
      {
        "status": "affected",
        "version": "Version 1809 for x64-based Systems"
      }
    ]
  },
  {
    "product": "Windows Server 2019",
    "vendor": "Microsoft",
    "versions": [
      {
        "status": "affected",
        "version": "(Server Core installation)"
      }
    ]
  },
  {
    "product": "Windows 10 Servers",
    "vendor": "Microsoft",
    "versions": [
      {
        "status": "affected",
        "version": "version 1709  (Server Core Installation)"
      },
      {
        "status": "affected",
        "version": "version 1803  (Server Core Installation)"
      }
    ]
  }
]

Social References

More

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

5.3 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

6.2 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

24.1%