Privilege escalation in Windows Desktop Bridge

Published: 2018-03-13 23:18:55 | Updated: 2018-03-13 23:21:38
Severity Low
Patch available YES
Number of vulnerabilities 2
CVE ID CVE-2018-0877
CVE-2018-0880
CVSSv3 6.4 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H/E:U/RL:O/RC:C]
7.7 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CWE ID CWE-264
Exploitation vector Local
Public exploit Not available
Vulnerable software Windows
Windows Server
Vulnerable software versions Windows 10
Windows Server 2016
Vendor URL Microsoft

Security Advisory

1) Privilege escalation

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists due to the Desktop Bridge VFS does not take into acccount user/kernel mode when managing file paths. A local attacker can run a specially crafted application and gain system privileges to perform further attacks.

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0877

2) Privilege escalation

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists due to improper management of the virtual registry by Desktop Bridge. A local attacker can run a specially crafted application and run arbitrary code in kernel mode.

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0880

Back to List