Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2018-8410Improper Resource Shutdown or Release in Microsoft Windows 10

Severity
7.8HIGHNVD
EPSS
26.4%
top 3.67%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedSep 13
Latest updateMay 13

Description

An elevation of privilege vulnerability exists when the Windows Kernel API improperly handles registry objects in memory, aka "Windows Registry Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages11 packages

CVEListV5microsoft/windows_server_2012(Server Core installation)
CVEListV5microsoft/windows_server_2012_r2(Server Core installation)
CVEListV5microsoft/windows_10_serversversion 1803 (Server Core Installation)
CVEListV5microsoft/windows_server_2016(Server Core installation)
CVEListV5microsoft/windows_server_2008_r2Itanium-Based Systems Service Pack 1, x64-based Systems Service Pack 1, x64-based Systems Service Pack 1 (Server Core installation)+2

Patches

🔴Vulnerability Details

2
GHSA
GHSA-v8qp-xq63-v94p: An elevation of privilege vulnerability exists when the Windows Kernel API improperly handles registry objects in memory, aka "Windows Registry Elevat2022-05-13
CVEList
CVE-2018-8410: An elevation of privilege vulnerability exists when the Windows Kernel API improperly handles registry objects in memory, aka "Windows Registry Elevat2018-09-13

💥Exploits & PoCs

1
Exploit-DB
Microsoft Windows - Double Dereference in NtEnumerateKey Elevation of Privilege2018-09-19

📋Vendor Advisories

1
Microsoft
Windows Registry Elevation of Privilege Vulnerability2018-09-11
CVE-2018-8410 — Improper Resource Shutdown or Release | cvebase