• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Advisory – Adobe Flash Player Security Bypass Vulnerability
September 12, 2018
Rewterz Threat Advisory – Microsoft Windows Server 2016 / Windows 10 Multiple Vulnerabilities
September 12, 2018

Rewterz Threat Advisory – Microsoft Windows Server 2012 / Windows RT 8.1 / 8.1 Multiple Vulnerabilities

September 12, 2018

Multiple vulnerabilities have been reported in Microsoft Windows Server 2012, Microsoft Windows RT 8.1, and Microsoft Windows 8.1 and updates are available.

 

 

IMPACT:  HIGH

 

 

PUBLISH DATE:  12-09-2018

 

 

OVERVIEW

 

 

Multiple vulnerabilities have been reported in Microsoft Windows Server 2012, Microsoft Windows RT 8.1, and Microsoft Windows 8.1, which can be exploited to cause a number of inconveniences including denial of service and security bypass leading to exposure of sensitive information. The vendor has released multiple updates to fix these vulnerabilities.

 

 

ANALYSIS

 

 

Many of these vulnerabilities when exploited may lead to system access, DoS, Privilege escalation, Exposure of sensitive information and Security Bypass. Local users with malicious intent may expose sensitive information or gain elevated privileges.

 

Similarly, malicious users in a guest virtual machine may cause a DoS (Denial of Service), or expose sensitive data and bypass certain security restrictions. Malicious people can exploit these vulnerabilities to compromise a vulnerable system.

 

A number of CVE references are associated with the updates, whose descriptions are not available at the time of creation of this advisory.

 

These include:

CVE-2018-8455

CVE-2018-8271

CVE-2018-8434

CVE-2018-8446

CVE-2018-8420

CVE-2018-8442

CVE-2018-8443

CVE-2018-8444

CVE-2018-8475

CVE-2018-8424

CVE-2018-8392

CVE-2018-8393

CVE-2018-8410

CVE-2018-8468

CVE-2018-8332

CVE-2018-8419

CVE-2018-8438

CVE-2018-8440

CVE-2018-8433

CVE-2018-8439

CVE-2018-8335

 

Apart from these, CVE-2018-5391 is identified as a Linux kernel, versions 3.9+ vulnerability. An attacker may cause a denial of service condition by sending specially crafted IP fragments.

 

 

AFFECTED PRODUCTS

 

 

Microsoft Windows Server 2012

Microsoft Windows RT 8.1

Microsoft Windows 8.1

 

 

UPDATES

 

 

Update the following versions as suggested:

  • Windows 8.1 for 32-bit systems (KB4457143)

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4457143

 

  • Windows RT 8.1 (KB4457129):

Apply update (Security updates for Windows RT 8.1 are available via e.g. Windows Update or Windows Update Catalog only.)

  • Windows 8.1 for x64-based systems (KB4457129):
  • Windows Server 2012 R2 (KB4457129):
  • Windows Server 2012 R2 (Server Core installation) (KB4457129):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4457129

 

  • Windows 8.1 for 32-bit systems (KB4457129):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4457129

 

  • Windows Server 2012 (KB4457135):
  • Windows Server 2012 (Server Core installation) (KB4457135):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4457135

 

  • Windows Server 2012 (KB4457140):
  • Windows Server 2012 (Server Core installation) (KB4457140):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4457140

 

 

  • Windows 8.1 for x64-based systems (KB4457143):
  • Windows Server 2012 R2 (KB4457143):
  • Windows Server 2012 R2 (Server Core installation) (KB4457143):

https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4457143

 

It is recommended to update the products you’re using, if any, as soon as possible.

If you think you’re the victim of a cyber-attack, immediately send an email to info@rewterz.com.

  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.