logo_SVG-01
✕
  • Platform
    • Rewterz XDR
    • Rewterz Defense
    • Rewterz Threat Intelligence
    • Managed Security Services
    • Managed Penetration Testing
  • Services
    • Assess
      • Compromise Assessment
      • Advanced Persistent Threats Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      • SOC Maturity Assessment
      • SOC Model Evaluation
      • SOC Gap Analysis
      • SIEM Gap Analysis
      • SIEM Optimization
      • SOC Content Pack
    • Train
      • Simulated Cyber Attack Exercise
      • Tabletop Exercise
      • Security Awareness and Training
    • Respond
      • Incident Analysis
      • Incident Response
  • Solutions
  • Resources
    • Blogs
    • Press Releases
    • Threat Insights
      • Threat Intelligence Reports
      • Threat Advisories
      • Monthly Threat Insights
  • Why Rewterz?
    • About Us
    • Careers
    • Contact
logo_SVG-01
  • Platform
    xdrLogo
    center_new
    Read More about XDR

    Platform

    • Rewterz XDR
    • Rewterz Defense
    • Rewterz Threat Intelligence
    Rewterz Threat Advisory – Microsoft Windows Server 2008 and Windows 7 multiple vulnerabilities

    Managed Security Services

    • Managed Security Monitoring
    • Remote SOC
    • Onsite SOC
    • Hybrid SOC

    Managed Penetration Testing

    Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.

  • Services

    Assess

    • Compromise Assessment
    • APT Assessment
    • Penetration Testing
    • Architecture Design & Review
    • Red Team Assessment
    • Purple Team Assessment
    • Social Engineering
    • Source Code Review

    Transform

    • SOC Consultancy
    • SOC Maturity Assessment
    • SOC Model Evaluation
    • SOC Gap Analysis
    • SIEM Gap Analysis
    • SIEM Optimization
    • SOC Content Pack

    Train

    • Simulated Cyber Attack Exercise
    • Tabletop Exercise
    • Security Awareness and Training

    Respond

    • Incident Analysis
    • Incident Response
  • Solutions
  • Resources

    Resources

    • Blog
    • Press Releases
    March 19, 2023
    March 19, 2023
    Rewterz Threat Advisory – CVE-2022-42436 – IBM MQ Vulnerability
    Severity Medium Analysis Summary CVE-2022-42436 IBM MQ Managed File Transfer could allow a local user to obtain sensitive information from diagnostic files. Impact Indicators Of Compromise […]
    March 19, 2023
    March 19, 2023
    Rewterz Threat Advisory – ICS: Rockwell Automation Modbus TCP AOI Server Vulnerability
    Severity Medium Analysis Summary CVE-2023-0027 Rockwell Automation Modbus TCP AOI Server could allow a remote attacker to obtain sensitive information. By sending a malformed message, an […]
    March 17, 2023
    March 17, 2023
    Rewterz Threat Advisory – ICS: Multiple Schneider Electric IGSS Vulnerabilities
    Severity High Analysis Summary CVE-2023-27984 CVSS:7.8 Schneider Electric IGSS could allow a remote attacker to execute arbitrary code on the system, caused by improper input validation […]

    Threat Insights

    16
    pdf-file (1)
    Annual Threat Intelligence Report 2022
    • Threat Advisories
    • Monthly Threat Insights
    • Threat Intelligence Reports
  • Why Rewterz?

    About Us

    Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.

    Read More

    play_btn_Smallplay_btn_hover_Small
    leadership

    Our Leadership

    Our leadership team brings together years of knowledge and experience in cybersecurity to drive our company's mission and vision. Our team is passionate about delivering high-quality products and services, leading by example and assisting our clients in securing their organization’s environment.
    help

    CSR

    At Rewterz, we believe that businesses have a responsibility to impact positively and contribute to the well-being of our communities as well as the planet. That's why we are committed to operating in a socially responsible and sustainable way.

    Connect with Us

    • Contact
    • Careers
Get in Touch
logo_SVG-01
  • Platform
    xdrLogo
    center_new
    Read More about XDR

    Platform

    • Rewterz XDR
    • Rewterz Defense
    • Rewterz Threat Intelligence
    Rewterz Threat Advisory – Microsoft Windows Server 2008 and Windows 7 multiple vulnerabilities

    Managed Security Services

    • Managed Security Monitoring
    • Remote SOC
    • Onsite SOC
    • Hybrid SOC

    Managed Penetration Testing

    Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.

  • Services

    Assess

    • Compromise Assessment
    • APT Assessment
    • Penetration Testing
    • Architecture Design & Review
    • Red Team Assessment
    • Purple Team Assessment
    • Social Engineering
    • Source Code Review

    Transform

    • SOC Consultancy
    • SOC Maturity Assessment
    • SOC Model Evaluation
    • SOC Gap Analysis
    • SIEM Gap Analysis
    • SIEM Optimization
    • SOC Content Pack

    Train

    • Simulated Cyber Attack Exercise
    • Tabletop Exercise
    • Security Awareness and Training

    Respond

    • Incident Analysis
    • Incident Response
  • Solutions
  • Resources

    Resources

    • Blog
    • Press Releases
    March 19, 2023
    March 19, 2023
    Rewterz Threat Advisory – CVE-2022-42436 – IBM MQ Vulnerability
    Severity Medium Analysis Summary CVE-2022-42436 IBM MQ Managed File Transfer could allow a local user to obtain sensitive information from diagnostic files. Impact Indicators Of Compromise […]
    March 19, 2023
    March 19, 2023
    Rewterz Threat Advisory – ICS: Rockwell Automation Modbus TCP AOI Server Vulnerability
    Severity Medium Analysis Summary CVE-2023-0027 Rockwell Automation Modbus TCP AOI Server could allow a remote attacker to obtain sensitive information. By sending a malformed message, an […]
    March 17, 2023
    March 17, 2023
    Rewterz Threat Advisory – ICS: Multiple Schneider Electric IGSS Vulnerabilities
    Severity High Analysis Summary CVE-2023-27984 CVSS:7.8 Schneider Electric IGSS could allow a remote attacker to execute arbitrary code on the system, caused by improper input validation […]

    Threat Insights

    16
    pdf-file (1)
    Annual Threat Intelligence Report 2022
    • Threat Advisories
    • Monthly Threat Insights
    • Threat Intelligence Reports
  • Why Rewterz?

    About Us

    Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.

    Read More

    play_btn_Smallplay_btn_hover_Small
    leadership

    Our Leadership

    Our leadership team brings together years of knowledge and experience in cybersecurity to drive our company's mission and vision. Our team is passionate about delivering high-quality products and services, leading by example and assisting our clients in securing their organization’s environment.
    help

    CSR

    At Rewterz, we believe that businesses have a responsibility to impact positively and contribute to the well-being of our communities as well as the planet. That's why we are committed to operating in a socially responsible and sustainable way.

    Connect with Us

    • Contact
    • Careers
Get in Touch
Rewterz
Rewterz Threat Advisory – CVE-2018- 8416 – Microsoft .NET core security bypass vulnerability
November 15, 2018
Rewterz
Rewterz Threat Advisory – CVE-2018-18559 – Linux Kernel “packet_do_bind()” Privilege Escalation Vulnerability
November 16, 2018

Rewterz Threat Advisory – Microsoft Windows Server 2008 and Windows 7 multiple vulnerabilities

November 15, 2018

Multiple vulnerabilities have been reported in Microsoft Windows Server 2008 and Windows 7, causing remote code execution, privilege escalation and information disclosure.

 

 

IMPACT:  HIGH

 

 

PUBLISH DATE:  11-15-2018

 

 

OVERVIEW

 

 

Multiple vulnerabilities have been reported in Microsoft Windows Server 2008 and Microsoft Windows 7, which can be exploited by malicious, local users to disclose sensitive information, bypass certain security restrictions, and gain escalated privileges and by malicious people to compromise a vulnerable system.

 

 

ANALYSIS

 

 

CVE-2018-8544

A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka “Windows VBScript Engine Remote Code Execution Vulnerability.” This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.

 

CVE-2018-8450

A remote code execution vulnerability exists when Windows Search handles objects in memory, aka “Windows Search Remote Code Execution Vulnerability.” This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.

 

CVE-2018-8550

An elevation of privilege exists in Windows COM Aggregate Marshaler, aka “Windows COM Elevation of Privilege Vulnerability.” This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.

 

CVE-2018-8407

An information disclosure vulnerability exists when “Kernel Remote Procedure Call Provider” driver improperly initializes objects in memory, aka “MSRPC Information Disclosure Vulnerability.” This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.

 

CVE-2018-8589

An elevation of privilege vulnerability exists when Windows improperly handles calls to Win32k.sys, aka “Windows Win32k Elevation of Privilege Vulnerability.” This affects Windows Server 2008, Windows 7, Windows Server 2008 R2.

 

CVE-2018-8476

A remote code execution vulnerability exists in the way that Windows Deployment Services TFTP Server handles objects in memory, aka “Windows Deployment Services TFTP Server Remote Code Execution Vulnerability.” This affects Windows Server 2012 R2, Windows Server 2008, Windows Server 2012, Windows Server 2019, Windows Server 2016, Windows Server 2008 R2, Windows 10 Servers.

 

CVE-2018-8256

A remote code execution vulnerability exists when PowerShell improperly handles specially crafted files, aka “Microsoft PowerShell Remote Code Execution Vulnerability.” This affects Windows RT 8.1, PowerShell Core 6.0, Microsoft.PowerShell.Archive 1.2.2.0, Windows Server 2016, Windows Server 2012, Windows Server 2008 R2, Windows Server 2019, Windows 7, Windows Server 2012 R2, PowerShell Core 6.1, Windows 10 Servers, Windows 10, Windows 8.1.

 

CVE-2018-8565

An information disclosure vulnerability exists when the win32k component improperly provides kernel information, aka “Win32k Information Disclosure Vulnerability.” This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.

 

CVE-2018-8563

An information disclosure vulnerability exists when DirectX improperly handles objects in memory, aka “DirectX Information Disclosure Vulnerability.” This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2012, Windows 8.1, Windows Server 2008 R2.

 

CVE-2018-8415

A tampering vulnerability exists in PowerShell that could allow an attacker to execute unlogged code, aka “Microsoft PowerShell Tampering Vulnerability.” This affects Windows 7, PowerShell Core 6.1, Windows Server 2012 R2, Windows RT 8.1, PowerShell Core 6.0, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.

 

CVE-2018-8553

A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory, aka “Microsoft Graphics Components Remote Code Execution Vulnerability.” This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10.

 

CVE-2018-8408

An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory, aka “Windows Kernel Information Disclosure Vulnerability.” This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.

 

CVE-2018-8471

An elevation of privilege vulnerability exists in the way that the Microsoft RemoteFX Virtual GPU miniport driver handles objects in memory, aka “Microsoft RemoteFX Virtual GPU miniport driver Elevation of Privilege Vulnerability.” This affects Windows Server 2016, Windows 10, Windows 8.1, Windows 7, Windows Server 2019.

 

CVE-2018-8562

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka “Win32k Elevation of Privilege Vulnerability.” This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.

 

 

AFFECTED PRODUCTS

 

 

  • Microsoft Windows Server 2008
  • Microsoft Windows 7

 

 

UPDATES

 

 

Update the following versions as suggested:

 

  • Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1 (KB4467106):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4467106

 

  • Windows 7 for x64-based Systems Service Pack 1 (KB4467106):
  • Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) (KB4467106):
  • Windows Server 2008 R2 for x64-based Systems Service Pack 1 (KB4467106):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4467106

 

  • Windows 7 for 32-bit Systems Service Pack 1 (KB4467106):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4467106

 

  • Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1 (KB4467107):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4467107

 

  • Windows 7 for x64-based Systems Service Pack 1 (KB4467107):
  • Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) (KB4467107):
  • Windows Server 2008 R2 for x64-based Systems Service Pack 1 (KB4467107):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4467107

 

  • Windows 7 for 32-bit Systems Service Pack 1 (KB4467107):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4467107

  • Windows Server 2008 for Itanium-Based Systems Service Pack 2 (KB4467706):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4467706

  • Windows Server 2008 for Itanium-Based Systems Service Pack 2 (KB4467700):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4467700

  • Windows Server 2008 for x64-based Systems Service Pack 2 (KB4467700):
  • Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) (KB4467700):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4467700

 

 

  • Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) (KB4467700):
  • Windows Server 2008 for 32-bit Systems Service Pack 2 (KB4467700):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4467700

 

  • Windows Server 2008 for x64-based Systems Service Pack 2 (KB4467706):
  • Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) (KB4467706):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4467706

 

  • Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) (KB4467706):
  • Windows Server 2008 for 32-bit Systems Service Pack 2 (KB4467706):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4467706

 

  • Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) (KB3020369):
  • Windows Server 2008 for 32-bit Systems Service Pack 2 (KB3020369):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB3020369

 

  • Windows Server 2008 for Itanium-Based Systems Service Pack 2 (KB3020369):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB3020369

 

  • Windows Server 2008 for x64-based Systems Service Pack 2 (KB3020369):
  • Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) (KB3020369):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB3020369

 

  • Windows 7 for x64-based Systems Service Pack 1 (KB3177467):
  • Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) (KB3177467):
  • Windows Server 2008 R2 for x64-based Systems Service Pack 1 (KB3177467):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB3177467

 

  • Windows 7 for 32-bit Systems Service Pack 1 (KB3177467):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB3177467

 

  • Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1 (KB3177467):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB3177467

 

It is recommended to update the products you’re using, if any, as soon as possible.

If you think you’re the victim of a cyber-attack, immediately send an email to soc@rewterz.com.

Platform

  • Rewterz XDR
  • Rewterz Defense
  • Rewterz Threat Intelligence

Managed Security Services

  • Managed Security Monitoring
  • Remote SOC
  • Onsite SOC
  • Hybrid SOC

Assess

  • Compromise Assessment
  • APT Assessment
  • Penetration Testing
  • Architecture Design & Review
  • Red Team Assessment
  • Purple Team Assessment
  • Social Engineering
  • Source Code Review

Transform

  • SOC Consultancy
  • SOC Maturity Assessment
  • SOC Model Evaluation
  • SOC Gap Analysis
  • SIEM Gap Analysis
  • SIEM Optimization
  • SOC Content Pack

Train

  • Simulated Cyber Attack Exercise
  • Tabletop Exercise
  • Security Awareness and Training

Respond

  • Incident Analysis
  • Incident Response

Threat Insights

  • Threat Advisories
  • Monthly Threat Insights
  • Threat Intelligence Reports

Resources

  • Blog
  • Press Releases

Connect With Us

  • Contact
  • Careers
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.
Get a Demo