Vulnerability Name: | CVE-2018-8231 (CCN-144019) | ||||||||||||
Assigned: | 2018-06-12 | ||||||||||||
Published: | 2018-06-12 | ||||||||||||
Updated: | 2019-10-03 | ||||||||||||
Summary: | A remote code execution vulnerability exists when HTTP Protocol Stack (Http.sys) improperly handles objects in memory, aka "HTTP Protocol Stack Remote Code Execution Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. | ||||||||||||
CVSS v3 Severity: | 8.1 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) 7.1 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
7.1 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
| ||||||||||||
Vulnerability Type: | CWE-noinfo | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-8231 Source: BID Type: Third Party Advisory, VDB Entry 104373 Source: CCN Type: BID-104373 Microsoft Windows 'HTTP.sys' CVE-2018-8231 Remote Code Execution Vulnerability Source: SECTRACK Type: Third Party Advisory, VDB Entry 1041094 Source: XF Type: UNKNOWN ms-http-cve20188231-code-exec(144019) Source: CCN Type: Microsoft Security TechCenter - June 2018 HTTP Protocol Stack Remote Code Execution Vulnerability Source: CONFIRM Type: Patch, Vendor Advisory https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8231 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||
BACK |