726
VMScore

CVE-2018-8453

Published: 10/10/2018 Updated: 03/10/2019
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 726
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows server 2012 -

microsoft windows server 2008 r2

microsoft windows server 2008 -

microsoft windows rt 8.1 -

microsoft windows server 2016 1709

microsoft windows server 2012 r2

microsoft windows 8.1

microsoft windows 10 1809

microsoft windows 10 1709

microsoft windows server 2019 -

microsoft windows 10 1703

microsoft windows 10 1607

microsoft windows 10 -

microsoft windows server 2016 1803

microsoft windows server 2016 -

microsoft windows 7 -

microsoft windows 10 1803

Exploits

## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Local Rank = ManualRanking include Msf::Post::File include Msf::Exploit::EXE include Msf::Post::Windows::Priv include Msf::Exploit::FileDropper def initial ...
An elevation of privilege vulnerability exists in Microsoft Windows when the Win32k component fails to properly handle objects in memory This affects Windows 7, Windows Server 2012 R2, Windows RT 81, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 81, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Serv ...

Github Repositories

cve-2018-8453 exp

cve-2018-8453-exp cve-2018-8453 exp 本程序为cve-2018-8453的利用程序。 漏洞本身存在于win7及以后版本 但注意: 只有在win81及以后版本中才能利用!故本EXP只可用于WIN81及以后版本。 开发\测试平台:windows 10 rs2 1506 附: 使用Palette来读写内核

leHACK 2019: Analyzing CVE-2018-8453: An interesting tale of UAF and Double Free in Windows Kernel This talk was delivered at leHACK 2019 Abstract In this talk, we discuss intricate details of exploitation of CVE-2018-8453, a vulnerability in win32sys Microsoft Windows driver It which was reported by Kaspersky Lab as it was being used in highly targeted attacks In this talk,

cve-2018-8453 exp

cve-2018-8453-exp cve-2018-8453 exp 本程序为cve-2018-8453的利用程序。 开发\测试平台:x86: windows 10 rs2 15063 x64: windos 10 rs2 16299 附: 使用Palette来读写内核 严重声明: 本工具仅用于技术研究学习。非法使用造成一切后果,均与本人无关。

Recent Articles

APT trends report Q3 2022
Securelist • GReAT • 01 Nov 2022

For more than five years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of advanced persistent threat (APT) activity. These summaries are based on our threat intelligence research; and they provide a representative snapshot of what we have published and discussed in greater detail in our private APT reports. They are designed to highlight the significant events and findings that we feel people should be aware of. This is our latest installment...

Sodin ransomware exploits Windows vulnerability and processor architecture
Securelist • Orkhan Mamedov Artur Pakulov Fedor Sinitsyn • 03 Jul 2019

When Sodin (also known as Sodinokibi and REvil) appeared in the first half of 2019, it immediately caught our attention for distributing itself through an Oracle Weblogic vulnerability and carrying out attacks on MSP providers. In a detailed analysis, we discovered that it also exploits the CVE-2018-8453 vulnerability to elevate privileges in Windows (rare among ransomware), and uses legitimate processor functions to circumvent security solutions. According to our statistics, most victims were l...

Zero-day in Windows Kernel Transaction Manager (CVE-2018-8611)
Securelist • Boris Larin Vladislav Stolyarov Anton Ivanov • 12 Dec 2018

In October 2018, our AEP (Automatic Exploit Prevention) systems detected an attempt to exploit a vulnerability in the Microsoft Windows operating system. Further analysis led us to uncover a zero-day vulnerability in ntoskrnl.exe. We reported it to Microsoft on October 29, 2018. The company confirmed the vulnerability and assigned it CVE-2018-8611. Microsoft just released a patch, part of its December update, crediting Kaspersky Lab researchers Boris Larin (Oct0xor) and Igor Soumenkov (2igosha) ...

Kaspersky Security Bulletin 2018. Top security stories
Securelist • David Emm Victor Chebyshev • 03 Dec 2018

The internet is now woven into the fabric of our lives. Many people routinely bank, shop and socialize online and the internet is the lifeblood of commercial organizations. The dependence on technology of governments, businesses and consumers provides a broad attack surface for attackers with all kinds of motives – financial theft, theft of data, disruption, damage, reputational damage or simply ‘for the lulz’. The result is a threat landscape that ranges from highly sophisticated targeted...

Zero-day exploit (CVE-2018-8453) used in targeted attacks
Securelist • AMR • 10 Oct 2018

Yesterday, Microsoft published their security bulletin, which patches CVE-2018-8453, among others. It is a vulnerability in win32k.sys discovered by Kaspersky Lab in August. We reported this vulnerability to Microsoft on August 17, 2018. Microsoft confirmed the vulnerability and designated it CVE-2018-8453. In August 2018 our Automatic Exploit Prevention (AEP) systems detected an attempt to exploit a vulnerability in Microsoft Windows operating system. Further analysis into this case led us to u...

It's October 2018, and Microsoft Exchange can be pwned by a plucky eight-year-old... bug
The Register • Shaun Nichols in San Francisco • 09 Oct 2018

Redmond goes retro in latest Patch Tuesday bundle

Microsoft has released the October edition of its monthly security update, addressing a total of 49 CVE-listed bugs. Among the 49 fixes were three issues that have already been publicly disclosed and a fourth that was being targeted in the wild. On top of that, a remote code execution bug in Exchange Server is the resurfacing of a vulnerability first found in 2010. CVE-2010-3190 is a remote code execution bug created by insecure handling of DLL files in applications made with Microsoft Foundatio...