Lucene search

K
cve[email protected]CVE-2018-8129
HistoryMay 09, 2018 - 7:29 p.m.

CVE-2018-8129

2018-05-0919:29:01
web.nvd.nist.gov
87
cve-2018-8129
security feature bypass vulnerability
windows server 2016
windows 10 servers
device guard bypass

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS3

5.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

AI Score

6.4

Confidence

High

EPSS

0.001

Percentile

23.9%

A security feature bypass vulnerability exists in Windows which could allow an attacker to bypass Device Guard, aka “Windows Security Feature Bypass Vulnerability.” This affects Windows Server 2016, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-0854, CVE-2018-0958, CVE-2018-8132.

Affected configurations

Vulners
NVD
Node
microsoftwindows_server_2016
Node
microsoftwindows_10_2004_for_32-bit_systems
OR
microsoftwindows_10Match1607x32
OR
microsoftwindows_10Match1607x64
OR
microsoftwindows_10Match1703x32
OR
microsoftwindows_10Match1703x64
OR
microsoftwindows_10Match1709x32
OR
microsoftwindows_10Match1709x64
OR
microsoftwindows_10Match1803x32
OR
microsoftwindows_10Match1803x64
OR
microsoftwindows_10_1903_for_x64-based_systems
Node
microsoftwindows_10Match1709
OR
microsoftwindows_10Match1803
VendorProductVersionCPE
microsoftwindows_server_2016(Server Core installation)cpe:2.3:o:microsoft:windows_server_2016:(Server Core installation):*:*:*:*:*:*:*
microsoftwindows_1032-bit Systemscpe:2.3:o:microsoft:windows_10:32-bit Systems:*:*:*:*:*:*:*
microsoftwindows_10Version 1607 for 32-bit Systemscpe:2.3:o:microsoft:windows_10:Version 1607 for 32-bit Systems:*:*:*:*:*:*:*
microsoftwindows_10Version 1607 for x64-based Systemscpe:2.3:o:microsoft:windows_10:Version 1607 for x64-based Systems:*:*:*:*:*:*:*
microsoftwindows_10Version 1703 for 32-bit Systemscpe:2.3:o:microsoft:windows_10:Version 1703 for 32-bit Systems:*:*:*:*:*:*:*
microsoftwindows_10Version 1703 for x64-based Systemscpe:2.3:o:microsoft:windows_10:Version 1703 for x64-based Systems:*:*:*:*:*:*:*
microsoftwindows_10Version 1709 for 32-bit Systemscpe:2.3:o:microsoft:windows_10:Version 1709 for 32-bit Systems:*:*:*:*:*:*:*
microsoftwindows_10Version 1709 for x64-based Systemscpe:2.3:o:microsoft:windows_10:Version 1709 for x64-based Systems:*:*:*:*:*:*:*
microsoftwindows_10Version 1803 for 32-bit Systemscpe:2.3:o:microsoft:windows_10:Version 1803 for 32-bit Systems:*:*:*:*:*:*:*
microsoftwindows_10Version 1803 for x64-based Systemscpe:2.3:o:microsoft:windows_10:Version 1803 for x64-based Systems:*:*:*:*:*:*:*
Rows per page:
1-10 of 131

CNA Affected

[
  {
    "product": "Windows Server 2016",
    "vendor": "Microsoft",
    "versions": [
      {
        "status": "affected",
        "version": "(Server Core installation)"
      }
    ]
  },
  {
    "product": "Windows 10",
    "vendor": "Microsoft",
    "versions": [
      {
        "status": "affected",
        "version": "32-bit Systems"
      },
      {
        "status": "affected",
        "version": "Version 1607 for 32-bit Systems"
      },
      {
        "status": "affected",
        "version": "Version 1607 for x64-based Systems"
      },
      {
        "status": "affected",
        "version": "Version 1703 for 32-bit Systems"
      },
      {
        "status": "affected",
        "version": "Version 1703 for x64-based Systems"
      },
      {
        "status": "affected",
        "version": "Version 1709 for 32-bit Systems"
      },
      {
        "status": "affected",
        "version": "Version 1709 for x64-based Systems"
      },
      {
        "status": "affected",
        "version": "Version 1803 for 32-bit Systems"
      },
      {
        "status": "affected",
        "version": "Version 1803 for x64-based Systems"
      },
      {
        "status": "affected",
        "version": "x64-based Systems"
      }
    ]
  },
  {
    "product": "Windows 10 Servers",
    "vendor": "Microsoft",
    "versions": [
      {
        "status": "affected",
        "version": "version 1709  (Server Core Installation)"
      },
      {
        "status": "affected",
        "version": "version 1803  (Server Core Installation)"
      }
    ]
  }
]

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS3

5.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

AI Score

6.4

Confidence

High

EPSS

0.001

Percentile

23.9%