Privilege escalation in Microsoft Windows Desktop Bridge

Published: 2018-06-12 22:17:45
Severity Low
Patch available YES
Number of vulnerabilities 2
CVE ID CVE-2018-8208
CVE-2018-8214
CVSSv3 7.7 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
7.7 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CWE ID CWE-264
Exploitation vector Local
Public exploit N/A
Vulnerable software Windows
Windows Server
Vulnerable software versions Windows 10
Windows Server 2016
Vendor URL Microsoft

Security Advisory

1) Privilege escalation

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The vulnerability exists due to improper management of the virtual registry by the Windows Desktop Bridge. A local attacker can run a specially crafted application and run arbitrary code in kernel mode.

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8208

2) Privilege escalation

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The vulnerability exists due to improper management of the virtual registry by the Windows Desktop Bridge. A local attacker can run a specially crafted application and run arbitrary code in kernel mode.

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8214

Back to List