First published: Thu Apr 12 2018(Updated: )
An elevation of privilege vulnerability exists when Windows improperly handles objects in memory and incorrectly maps kernel memory, aka "Microsoft DirectX Graphics Kernel Subsystem Elevation of Privilege Vulnerability." This affects Windows Server 2012 R2, Windows RT 8.1, Windows Server 2012, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Windows 10 | ||
Windows 10 | =1511 | |
Windows 10 | =1607 | |
Windows 10 | =1703 | |
Windows 10 | =1709 | |
Microsoft Windows | ||
Microsoft Windows RT | ||
Microsoft Windows Server | ||
Microsoft Windows Server | =r2 | |
Microsoft Windows Server 2016 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1009 has a severity rating of important as it may allow an attacker to elevate their privileges.
To fix CVE-2018-1009, ensure that your Windows operating system is updated with the latest security patches provided by Microsoft.
CVE-2018-1009 affects various versions of Microsoft Windows, including Windows 10, Windows 8.1, and Windows Server editions.
Exploiting CVE-2018-1009 can allow an attacker to run arbitrary code with elevated privileges, potentially compromising the affected system.
Currently, the most effective mitigation for CVE-2018-1009 is to apply the latest updates, as there are no documented workarounds.