Lucene search

K
symantecSymantec Security ResponseSMNTC-104621
HistoryJul 10, 2018 - 12:00 a.m.

Microsoft Wireless Display Adapter CVE-2018-8306 Command Injection Vulnerability

2018-07-1000:00:00
Symantec Security Response
www.symantec.com
34

0.001 Low

EPSS

Percentile

30.7%

Description

Microsoft Wireless Display Adapter is prone to a command-injection vulnerability. An attacker may exploit this issue to inject and execute arbitrary commands within the context of the affected application; this may aid in further attacks.

Technologies Affected

  • Microsoft Wireless Display Adapter 2.0.8350
  • Microsoft Wireless Display Adapter 2.0.8365
  • Microsoft Wireless Display Adapter 2.0.8372

Recommendations

Block external access at the network boundary, unless external parties require service.
If possible, block external access to the server hosting the vulnerable software. Permit access for trusted or internal networks and computers only.

Deploy network intrusion detection systems to monitor network traffic for malicious activity.
Deploy NIDS to monitor the network for suspicious requests. This may help detect attacks that try to exploit this and similar vulnerabilities. Audit all applicable logs regularly

Run all software as a nonprivileged user with minimal access rights.
To reduce the impact of latent vulnerabilities, run all server processes with the minimal amount of privileges required for functionality.

Updates are available. Please see the references or vendor advisory for more information.