Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2018-8134Microsoft Windows 10 vulnerability

5 documents5 sources
Severity
7.0HIGHNVD
EPSS
9.9%
top 6.97%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedMay 9
Latest updateMay 13

Description

An elevation of privilege vulnerability exists in the way that the Windows Kernel API enforces permissions, aka "Windows Elevation of Privilege Vulnerability." This affects Windows Server 2012 R2, Windows RT 8.1, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers.

CVSS vector

CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.0 | Impact: 5.9

Affected Packages8 packages

CVEListV5microsoft/windows_10_serversversion 1709 (Server Core Installation), version 1803 (Server Core Installation)+1
CVEListV5microsoft/windows_server_2016(Server Core installation)
CVEListV5microsoft/windows_server_2012_r2(Server Core installation)
NVDmicrosoft/windowsr2, 1709, 1803+2
CVEListV5microsoft/windows_1010 versions+9

Patches

🔴Vulnerability Details

2
GHSA
GHSA-xqfw-prqj-gxqv: An elevation of privilege vulnerability exists in the way that the Windows Kernel API enforces permissions, aka "Windows Elevation of Privilege Vulner2022-05-13
CVEList
CVE-2018-8134: An elevation of privilege vulnerability exists in the way that the Windows Kernel API enforces permissions, aka "Windows Elevation of Privilege Vulner2018-05-09

💥Exploits & PoCs

1
Exploit-DB
Microsoft Windows - Token Process Trust SID Access Check Bypass Privilege Escalation2018-05-16

📋Vendor Advisories

1
Microsoft
Windows Elevation of Privilege Vulnerability2018-05-08
CVE-2018-8134 — Microsoft Windows 10 vulnerability | cvebase