First published: Wed Nov 14 2018(Updated: )
A security feature bypass exists when Windows incorrectly validates kernel driver signatures, aka "Windows Security Feature Bypass Vulnerability." This affects Windows Server 2012 R2, Windows RT 8.1, Windows Server 2012, Windows Server 2019, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 10 | ||
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =1703 | |
Microsoft Windows 10 | =1709 | |
Microsoft Windows 10 | =1803 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 8.1 | ||
Microsoft Windows RT | ||
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows Server 2012 x64 | =r2 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | =1709 | |
Microsoft Windows Server 2016 | =1803 | |
Microsoft Windows Server 2019 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-8549 is rated as important by Microsoft, indicating that it may allow attackers to bypass security features.
To mitigate CVE-2018-8549, you should apply the latest Windows security updates provided by Microsoft.
CVE-2018-8549 affects various versions of Windows, including Windows 10, Windows 8.1, and Windows Server operating systems.
Yes, CVE-2018-8549 could potentially be exploited by an attacker who has the ability to run code on the affected system.
While there is no specific workaround for CVE-2018-8549, ensuring that security settings are properly configured can help mitigate risks until a patch is applied.