Privilege escalation in Windows Desktop Bridge

Published: 2018-03-13 23:18:55 | Updated: 2018-03-13
Severity Low
Patch available YES
Number of vulnerabilities 2
CVE ID CVE-2018-0877
CVE-2018-0880
CVSSv3 6.4 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H/E:U/RL:O/RC:C]
7.7 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CWE ID CWE-264
Exploitation vector Local
Public exploit N/A
Vulnerable software Windows
Windows Server
Vulnerable software versions Windows 10
Windows Server 2016
Vendor URL Microsoft

Security Advisory

1) Privilege escalation

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists due to the Desktop Bridge VFS does not take into acccount user/kernel mode when managing file paths. A local attacker can run a specially crafted application and gain system privileges to perform further attacks.

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0877

2) Privilege escalation

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists due to improper management of the virtual registry by Desktop Bridge. A local attacker can run a specially crafted application and run arbitrary code in kernel mode.

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0880

Back to List