logo_SVG-01
✕
  • Platform
    • Rewterz XDR
    • Rewterz Defense
    • Rewterz Threat Intelligence
    • Managed Security Services
    • Managed Penetration Testing
  • Services
    • Assess
      • Compromise Assessment
      • Advanced Persistent Threats Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      • SOC Maturity Assessment
      • SOC Model Evaluation
      • SOC Gap Analysis
      • SIEM Gap Analysis
      • SIEM Optimization
      • SOC Content Pack
    • Train
      • Simulated Cyber Attack Exercise
      • Tabletop Exercise
      • Security Awareness and Training
    • Respond
      • Incident Analysis
      • Incident Response
  • Solutions
  • Resources
    • Blogs
    • Press Releases
    • Threat Insights
      • Threat Intelligence Reports
      • Threat Advisories
      • Monthly Threat Insights
  • Why Rewterz?
    • About Us
    • Careers
    • Contact
logo_SVG-01
  • Platform
    xdrLogo
    center_new
    Read More about XDR

    Platform

    • Rewterz XDR
    • Rewterz Defense
    • Rewterz Threat Intelligence
    Rewterz Threat Advisory – Microsoft Windows 8.1 Multiple Vulnerabilities

    Managed Security Services

    • Managed Security Monitoring
    • Remote SOC
    • Onsite SOC
    • Hybrid SOC

    Managed Penetration Testing

    Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.

  • Services

    Assess

    • Compromise Assessment
    • APT Assessment
    • Penetration Testing
    • Architecture Design & Review
    • Red Team Assessment
    • Purple Team Assessment
    • Social Engineering
    • Source Code Review

    Transform

    • SOC Consultancy
    • SOC Maturity Assessment
    • SOC Model Evaluation
    • SOC Gap Analysis
    • SIEM Gap Analysis
    • SIEM Optimization
    • SOC Content Pack

    Train

    • Simulated Cyber Attack Exercise
    • Tabletop Exercise
    • Security Awareness and Training

    Respond

    • Incident Analysis
    • Incident Response
  • Solutions
  • Resources

    Resources

    • Blog
    • Press Releases
    March 15, 2023
    March 15, 2023
    Rewterz Threat Alert -New Golang-Based Botnet GoBruteforcer Breaches Web Servers – Active IOCs
    Severity High Analysis Summary According to researchers, a Golang-based botnet named GoBruteforcer has been discovered, which is specifically targeting web servers running FTP, MySQL, phpMyAdmin, and […]
    March 15, 2023
    March 15, 2023
    Rewterz Threat Alert – DarkComet RAT (Remote Access Trojan) – Active IOCs
    Severity High Analysis Summary DarkComet RAT (Remote Administration Tool) is a type of malware that is designed to allow attackers to gain remote access to a […]
    March 15, 2023
    March 15, 2023
    Rewterz Threat Advisory -Multiple Microsoft Windows Products Vulnerabilties
    Severity High Analysis Summary CVE-2023-23410 CVSS:7.8 Microsoft Windows could allow a local authenticated attacker to gain elevated privileges on the system, caused by a flaw in […]

    Threat Insights

    16
    pdf-file (1)
    Annual Threat Intelligence Report 2022
    • Threat Advisories
    • Monthly Threat Insights
    • Threat Intelligence Reports
  • Why Rewterz?

    About Us

    Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.

    Read More

    play_btn_Smallplay_btn_hover_Small
    leadership

    Our Leadership

    Our leadership team brings together years of knowledge and experience in cybersecurity to drive our company's mission and vision. Our team is passionate about delivering high-quality products and services, leading by example and assisting our clients in securing their organization’s environment.
    help

    CSR

    At Rewterz, we believe that businesses have a responsibility to impact positively and contribute to the well-being of our communities as well as the planet. That's why we are committed to operating in a socially responsible and sustainable way.

    Connect with Us

    • Contact
    • Careers
Get in Touch
logo_SVG-01
  • Platform
    xdrLogo
    center_new
    Read More about XDR

    Platform

    • Rewterz XDR
    • Rewterz Defense
    • Rewterz Threat Intelligence
    Rewterz Threat Advisory – Microsoft Windows 8.1 Multiple Vulnerabilities

    Managed Security Services

    • Managed Security Monitoring
    • Remote SOC
    • Onsite SOC
    • Hybrid SOC

    Managed Penetration Testing

    Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.

  • Services

    Assess

    • Compromise Assessment
    • APT Assessment
    • Penetration Testing
    • Architecture Design & Review
    • Red Team Assessment
    • Purple Team Assessment
    • Social Engineering
    • Source Code Review

    Transform

    • SOC Consultancy
    • SOC Maturity Assessment
    • SOC Model Evaluation
    • SOC Gap Analysis
    • SIEM Gap Analysis
    • SIEM Optimization
    • SOC Content Pack

    Train

    • Simulated Cyber Attack Exercise
    • Tabletop Exercise
    • Security Awareness and Training

    Respond

    • Incident Analysis
    • Incident Response
  • Solutions
  • Resources

    Resources

    • Blog
    • Press Releases
    March 15, 2023
    March 15, 2023
    Rewterz Threat Alert -New Golang-Based Botnet GoBruteforcer Breaches Web Servers – Active IOCs
    Severity High Analysis Summary According to researchers, a Golang-based botnet named GoBruteforcer has been discovered, which is specifically targeting web servers running FTP, MySQL, phpMyAdmin, and […]
    March 15, 2023
    March 15, 2023
    Rewterz Threat Alert – DarkComet RAT (Remote Access Trojan) – Active IOCs
    Severity High Analysis Summary DarkComet RAT (Remote Administration Tool) is a type of malware that is designed to allow attackers to gain remote access to a […]
    March 15, 2023
    March 15, 2023
    Rewterz Threat Advisory -Multiple Microsoft Windows Products Vulnerabilties
    Severity High Analysis Summary CVE-2023-23410 CVSS:7.8 Microsoft Windows could allow a local authenticated attacker to gain elevated privileges on the system, caused by a flaw in […]

    Threat Insights

    16
    pdf-file (1)
    Annual Threat Intelligence Report 2022
    • Threat Advisories
    • Monthly Threat Insights
    • Threat Intelligence Reports
  • Why Rewterz?

    About Us

    Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.

    Read More

    play_btn_Smallplay_btn_hover_Small
    leadership

    Our Leadership

    Our leadership team brings together years of knowledge and experience in cybersecurity to drive our company's mission and vision. Our team is passionate about delivering high-quality products and services, leading by example and assisting our clients in securing their organization’s environment.
    help

    CSR

    At Rewterz, we believe that businesses have a responsibility to impact positively and contribute to the well-being of our communities as well as the planet. That's why we are committed to operating in a socially responsible and sustainable way.

    Connect with Us

    • Contact
    • Careers
Get in Touch
Rewterz
Rewterz Threat Advisory – CVE-2018-18559 – Linux Kernel “packet_do_bind()” Privilege Escalation Vulnerability
November 16, 2018
Rewterz
Rewterz Threat Advisory – Microsoft Windows Server 2012, multiple vulnerabilities
November 19, 2018

Rewterz Threat Advisory – Microsoft Windows 8.1 Multiple Vulnerabilities

November 19, 2018

Multiple vulnerabilities in Microsoft Windows 8.1 are addressed in a recent update, fixing privilege escalation, information disclosure, DoS and security bypass.

 

 

IMPACT:  NORMAL

 

 

PUBLISH DATE:  11-19-2018

 

 

OVERVIEW

 

 

Multiple vulnerabilities have been reported in Microsoft Windows 8.1, which can be exploited by malicious, local users to cause information disclosure, security bypass, privilege escalation and DoS (Denial of Service). Updates are available.

 

 

ANALYSIS

 

 

A number of CVE references are associated with the updates.

 

CVE-2018-0751

The Windows Kernel API in Windows 8.1 and RT 8.1 allows a privilege escalation vulnerability due to the way the Kernel API enforces permissions, aka “Windows Elevation of Privilege Vulnerability”.

 

CVE-2018-0788

The Windows Adobe Type Manager Font Driver (Atmfd.dll) allows a privilege escalation vulnerability due to the way objects are handled in memory, aka “OpenType Font Driver Elevation of Privilege Vulnerability”.

 

CVE-2018-0752

The Windows Kernel API allows an elevation of privilege vulnerability due to the way the Kernel API enforces permissions, aka “Windows Elevation of Privilege Vulnerability”.

 

CVE-2018-0749

The Microsoft Server Message Block (SMB) Server allows an elevation of privilege vulnerability due to the way SMB Server handles specially crafted files, aka “Windows Elevation of Privilege Vulnerability”.

 

CVE-2018-0747

The Windows kernel allows an information disclosure vulnerability due to the way memory addresses are handled, aka “Windows Information Disclosure Vulnerability”.

 

CVE-2018-0754

The Windows Adobe Type Manager Font Driver (Atmfd.dll) allows an information disclosure vulnerability due to the way objects are handled in memory, aka “OpenType Font Driver Information Disclosure Vulnerability”.

 

CVE-2018-0753

A denial of service vulnerability exists in Windows 8.1 due to the way objects are handled in memory, aka “Windows IPSec Denial of Service Vulnerability”.

 

CVE-2018-0748

The Windows kernel allows an elevation of privilege vulnerability due to the way memory addresses are handled, aka “Windows Elevation of Privilege Vulnerability”.

 

CVE-2018-0744

The Windows kernel allows a privilege escalation vulnerability due to the way objects are handled in memory, aka “Windows Elevation of Privilege Vulnerability”.

 

CVE-2017-5753

Systems with microprocessors utilizing speculative execution and branch prediction may allow a malicious local user to cause unauthorized information disclosure via a side-channel analysis.

 

CVE-2017-5715

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

 

CVE-2017-5754

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.

 

CVE-2018-0746

The Windows kernel contains an information disclosure vulnerability due to the way memory addresses are handled, aka “Windows Information Disclosure Vulnerability”.

 

Multiple vulnerabilities may appear to be similar flaws but are inherently different from one another and may have different modes of exploitation.

 

 

AFFECTED PRODUCTS

 

 

Microsoft Windows 8.1

 

 

UPDATES

 

 

Update the following versions as suggested:

  • Windows 8.1 for 32-bit systems (KB4338815):
  • Windows 8.1 for x64-based systems (KB4338815):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB44338815

 

  • Windows 8.1 for 32-bit systems (KB4338824):
  • Windows 8.1 for x64-based systems (KB4338824):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4338824

Note: New fixes have been released for Microsoft Windows 8.1 for the vulnerability

with the CVE identifier CVE 2017-5715 due to a regression in the previous update.

 

  • Windows 8.1 (KB4078130):

https://www.catalog.update.microsoft.com/Search.aspx?q=KB4078130

 

  • Windows 8.1 for 32-bit systems (KB4088879):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4088879

 

  • Windows 8.1 for 32-bit systems (KB4088876):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4088876

 

It is recommended to update the products you’re using, if any, as soon as possible.

 

If you think you’re the victim of a cyber-attack, immediately send an email to soc@rewterz.com.

Platform

  • Rewterz XDR
  • Rewterz Defense
  • Rewterz Threat Intelligence

Managed Security Services

  • Managed Security Monitoring
  • Remote SOC
  • Onsite SOC
  • Hybrid SOC

Assess

  • Compromise Assessment
  • APT Assessment
  • Penetration Testing
  • Architecture Design & Review
  • Red Team Assessment
  • Purple Team Assessment
  • Social Engineering
  • Source Code Review

Transform

  • SOC Consultancy
  • SOC Maturity Assessment
  • SOC Model Evaluation
  • SOC Gap Analysis
  • SIEM Gap Analysis
  • SIEM Optimization
  • SOC Content Pack

Train

  • Simulated Cyber Attack Exercise
  • Tabletop Exercise
  • Security Awareness and Training

Respond

  • Incident Analysis
  • Incident Response

Threat Insights

  • Threat Advisories
  • Monthly Threat Insights
  • Threat Intelligence Reports

Resources

  • Blog
  • Press Releases

Connect With Us

  • Contact
  • Careers
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.
Get a Demo