Rewterz Threat Advisory – Microsoft Windows Server 2012 / Windows RT 8.1 / 8.1 Multiple Vulnerabilities
November 14, 2018Rewterz Threat Advisory – CVE-2018-8256 & CVE-2018-8415 – Windows PowerShell Multiple Vulnerabilities
November 14, 2018Rewterz Threat Advisory – Microsoft Windows Server 2012 / Windows RT 8.1 / 8.1 Multiple Vulnerabilities
November 14, 2018Rewterz Threat Advisory – CVE-2018-8256 & CVE-2018-8415 – Windows PowerShell Multiple Vulnerabilities
November 14, 2018Multiple vulnerabilities have been reported in Microsoft Windows Server 2019 which have been addressed in an update.
IMPACT: HIGH
PUBLISH DATE: 11-14-2018
OVERVIEW
Multiple vulnerabilities have been reported in Microsoft Windows Server 2019. Malicious people with physical access to systems can exploit these to bypass certain security restrictions. Malicious, local users may disclose sensitive information or bypass certain security restrictions to gain escalated privileges, exploiting these vulnerabilities. Malicious users may also conduct script insertion attacks to compromise a vulnerable system.
ANALYSIS
- An error related to the Kernel Remote Procedure Call Provider driver when initializing objects in memory can be exploited for information disclosure.
- Device Guard can be bypassed by exploiting an error within Microsoft JScript when managing COM object creation.
- Windows Audio Service contains an error when handling objects in memory that may disclose certain memory contents.
- An error related to the Microsoft RemoteFX Virtual GPU miniport driver when handling objects in memory can be exploited to execute arbitrary code with elevated privileges.
- Windows Deployment Services TFTP Server contains an error when handling objects in memory which can be exploited to execute arbitrary code with elevated privileges via a specially crafted request.
- Three different errors related to DirectX and one error related to the Win32k component when handling objects in memory can be exploited to execute arbitrary code in kernel mode.
- An error related to BitLocker Device Encryption can be exploited to gain access to otherwise restricted data. However, successful exploitation demands physical access of device before the next system reboot.
- An error related to the “keep nothing” option when installing from physical media can be exploited to gain otherwise restricted, local access.
- An error related to the VBScript when handling objects in memory can be exploited to execute arbitrary code.
- Certain input related to the Microsoft Active Directory Federation Services (AD FS) is not properly scanned before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user’s browser session in context of an affected site if malicious data is viewed.
- An error when validating kernel signatures can be exploited to bypass certain security features and load otherwise restricted signed drivers into the kernel.
- An error within Windows COM Aggregate Marshaler when processing interface requests can enable arbitrary code execution with multiple privileges.
- An error when handling calls to Advanced Local Procedure Call (ALPC) can be exploited to execute arbitrary code within the security context of the local system.
Following CVE numbers have been assigned to the vulnerabilities found in Microsoft Windows Server 2019.
CVE-2018-8256
CVE-2018-8485
CVE-2018-8550
CVE-2018-8566
CVE-2018-8415
CVE-2018-8554
CVE-2018-8561
CVE-2018-8592
CVE-2018-8584
CVE-2018-8476
CVE-2018-8562
CVE-2018-8471
CVE-2018-8454
CVE-2018-8547
CVE-2018-8417
CVE-2018-8407
CVE-2018-8549
CVE-2018-8544
AFFECTED PRODUCTS
Microsoft Windows Server 2019
UPDATES
Update the following versions as suggested:
- Windows Server 2019 (KB4467708):
- Windows Server 2019 (Server Core installation) (KB4467708):
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4467708
- Windows Server 2019 (KB4465664):
- Windows Server 2019 (Server Core installation) (KB4465664):
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4465664
If you think you’re the victim of a cyber-attack, immediately send an email to soc@rewterz.com.