Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |   

Category:   OS (Microsoft)  >   Windows Kernel Vendors:   Microsoft
Windows Kernel Driver Signature Validation Flaw Lets Local Users Modify Data on the Target System
SecurityTracker Alert ID:  1042138
SecurityTracker URL:
CVE Reference:   CVE-2018-8549   (Links to External Site)
Date:  Nov 14 2018
Impact:   Modification of system information, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2012, 2012 R2, 8.1, RT 8.1, 2016, 10, 10 Version 1607, 10 Version 1703, 10 Version 1709, 10 Version 1803, 10 Version 1809, Windows Server 2019
Description:   A vulnerability was reported in Windows Kernel. A local user can modify data on the target system.

A local user can bypass a security feature in the validation of kernel driver signatures.

Igor Glucksmann of Avast Software reported this vulnerability.

Impact:   A local user can modify data on the target system.
Solution:   The vendor has issued a fix.

The Microsoft advisories are available at:

Vendor URL: (Links to External Site)
Cause:   Access control error

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search

Content previously copyright LLC placed in the public domain on December 31, 2019.