Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2018-0826Corporation Windows Storage Services vulnerability

6 documents5 sources
Severity
7.0HIGHNVD
EPSS
3.1%
top 13.23%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedFeb 15
Latest updateMay 13

Description

Windows Storage Services in Windows 10 versions 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to the way objects are handled in memory, aka "Windows Storage Services Elevation of Privilege Vulnerability".

CVSS vector

CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.0 | Impact: 5.9

Affected Packages13 packages

CVEListV5microsoft_corporation/windows_storage_servicesWindows 10 versions 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709

Patches

🔴Vulnerability Details

1
GHSA
GHSA-x2pc-9gc4-6xm6: Windows Storage Services in Windows 10 versions 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of2022-05-13

💥Exploits & PoCs

1
Exploit-DB
Microsoft Windows - StorSvc SvcMoveFileInheritSecurity Arbitrary File Creation Privilege Escalation2018-02-20

📋Vendor Advisories

1
Microsoft
Windows Storage Services Elevation of Privilege Vulnerability2018-02-13

🕵️Threat Intelligence

2
Talos
Microsoft Patch Tuesday - February 20182018-02-13
Talos
Microsoft Patch Tuesday - February 20182018-02-13