First published: Wed Mar 14 2018(Updated: )
Windows Shell in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, Windows Server 2016 and Windows Server, version 1709 allows a remote code execution vulnerability due to how file copy destinations are validated, aka "Windows Shell Remote Code Execution Vulnerability".
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 10 | ||
Microsoft Windows 10 | =1511 | |
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =1703 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.1 | ||
Microsoft Windows RT | ||
Microsoft Windows Server | =1709 | |
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Server 2008 Itanium | =r2-sp1 | |
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows Server 2012 x64 | =r2 | |
Microsoft Windows Server 2016 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0883 is rated as critical due to its potential for remote code execution.
To address CVE-2018-0883, apply the latest security updates provided by Microsoft for affected Windows versions.
CVE-2018-0883 affects Windows 7 SP1, Windows 8.1, Windows 10 (various versions), and several editions of Windows Server.
Yes, CVE-2018-0883 can be exploited remotely, allowing an attacker to execute arbitrary code on a targeted system.
The impact of CVE-2018-0883 includes unauthorized execution of commands, potentially leading to data compromise.