First published: Thu Sep 13 2018(Updated: )
An elevation of privilege vulnerability exists when the Windows Kernel API improperly handles registry objects in memory, aka "Windows Registry Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 10 | ||
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =1703 | |
Microsoft Windows 10 | =1709 | |
Microsoft Windows 10 | =1803 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.1 | ||
Microsoft Windows RT | ||
Microsoft Windows Server | =2008-r2 | |
Microsoft Windows Server | =2008-sp2 | |
Microsoft Windows Server | =2012 | |
Microsoft Windows Server | =2012-r2 | |
Microsoft Windows Server | =2016 | |
Microsoft Windows Server | =2016-1709 | |
Microsoft Windows Server | =2016-1803 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-8410 has been classified as an elevation of privilege vulnerability with a critical impact on affected systems.
To mitigate CVE-2018-8410, it is recommended to apply the security updates provided by Microsoft for affected versions of Windows.
CVE-2018-8410 affects various versions of Windows including Windows 7, Windows 10, Windows Server 2012, and Windows Server 2016.
CVE-2018-8410 is an elevation of privilege vulnerability resulting from improper handling of registry objects in memory by the Windows Kernel API.
CVE-2018-8410 requires local access to exploit, meaning it cannot be exploited remotely.