Lucene search

K
nvd[email protected]NVD:CVE-2018-0786
HistoryJan 10, 2018 - 1:29 a.m.

CVE-2018-0786

2018-01-1001:29:00
CWE-295
web.nvd.nist.gov
1

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

7.4 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

69.0%

Microsoft .NET Framework 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, .NET Core 1.0 and 2.0, and PowerShell Core 6.0.0 allow a security feature bypass vulnerability due to the way certificates are validated, aka “.NET Security Feature Bypass Vulnerability.”

Affected configurations

NVD
Node
microsoft.net_coreMatch1.0
OR
microsoft.net_coreMatch2.0
OR
microsoftpowershell_coreMatch6.0
Node
microsoft.net_frameworkMatch2.0sp2
OR
microsoft.net_frameworkMatch3.0sp2
AND
microsoftwindows_server_2008Match-sp2
Node
microsoft.net_frameworkMatch3.5
AND
microsoftwindows_10Match-
OR
microsoftwindows_10Match1511
OR
microsoftwindows_10Match1607
OR
microsoftwindows_10Match1703
OR
microsoftwindows_10Match1709
OR
microsoftwindows_8.1Match-
OR
microsoftwindows_server_2012Match-
OR
microsoftwindows_server_2012Matchr2
OR
microsoftwindows_server_2016Match-
Node
microsoft.net_frameworkMatch3.5.1
AND
microsoftwindows_7Match-sp1
OR
microsoftwindows_server_2008Matchr2sp1itanium
OR
microsoftwindows_server_2008Matchr2sp1x64
Node
microsoft.net_frameworkMatch4.5.2
AND
microsoftwindows_7Match-sp1
OR
microsoftwindows_8.1Match-
OR
microsoftwindows_rt_8.1Match-
OR
microsoftwindows_server_2008Match-sp2
OR
microsoftwindows_server_2008Matchr2sp1x64
OR
microsoftwindows_server_2012Match-
OR
microsoftwindows_server_2012Matchr2
Node
microsoft.net_frameworkMatch4.6
AND
microsoftwindows_10Match-
OR
microsoftwindows_server_2008Match-sp2
Node
microsoft.net_frameworkMatch4.6.1
AND
microsoftwindows_10Match1511
Node
microsoft.net_frameworkMatch4.6.2
OR
microsoft.net_frameworkMatch4.7
AND
microsoftwindows_10Match1607
OR
microsoftwindows_server_2016Match-
Node
microsoft.net_frameworkMatch4.6
OR
microsoft.net_frameworkMatch4.6.1
OR
microsoft.net_frameworkMatch4.6.2
OR
microsoft.net_frameworkMatch4.7
AND
microsoftwindows_7Match-sp1
OR
microsoftwindows_8.1Match-
OR
microsoftwindows_rt_8.1Match-
OR
microsoftwindows_server_2008Matchr2sp1x64
OR
microsoftwindows_server_2012Match-
OR
microsoftwindows_server_2012Matchr2
Node
microsoft.net_frameworkMatch4.7
AND
microsoftwindows_10Match1703
Node
microsoft.net_frameworkMatch4.7.1
AND
microsoftwindows_10Match1709

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

7.4 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

69.0%