First published: Wed Oct 10 2018(Updated: )
A security feature bypass vulnerability exists in Device Guard that could allow an attacker to inject malicious code into a Windows PowerShell session, aka "Device Guard Code Integrity Policy Security Feature Bypass Vulnerability." This affects Windows Server 2016, Windows 10, Windows Server 2019, Windows 10 Servers.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =1703 | |
Microsoft Windows 10 | =1709 | |
Microsoft Windows 10 | =1803 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | =1709 | |
Microsoft Windows Server 2016 | =1803 | |
Microsoft Windows Server 2019 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-8492 is considered to have a high severity due to the potential for code injection in Windows PowerShell sessions.
To fix CVE-2018-8492, apply the relevant security updates provided by Microsoft for your affected Windows version.
CVE-2018-8492 affects Windows 10 (various versions), Windows Server 2016, and Windows Server 2019.
CVE-2018-8492 requires local access to exploit, making remote exploitation unlikely without prior access.
Mitigation for CVE-2018-8492 includes enforcing access controls and regularly updating software to the latest versions.