Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2018-8413Microsoft Windows 10 vulnerability

5 documents5 sources
Severity
7.8HIGHNVD
EPSS
62.9%
top 1.61%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedOct 10
Latest updateMay 13

Description

A remote code execution vulnerability exists when "Windows Theme API" does not properly decompress files, aka "Windows Theme API Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages12 packages

CVEListV5microsoft/windows_server_2012(Server Core installation)
CVEListV5microsoft/windows_server_2012_r2(Server Core installation)
CVEListV5microsoft/windows_10_serversversion 1709 (Server Core Installation), version 1803 (Server Core Installation)+1
CVEListV5microsoft/windows_server_2016(Server Core installation)
CVEListV5microsoft/windows_server_2019(Server Core installation)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-g28x-287m-pqv9: A remote code execution vulnerability exists when "Windows Theme API" does not properly decompress files, aka "Windows Theme API Remote Code Execution2022-05-13
CVEList
CVE-2018-8413: A remote code execution vulnerability exists when "Windows Theme API" does not properly decompress files, aka "Windows Theme API Remote Code Execution2018-10-10

💥Exploits & PoCs

1
Exploit-DB
Microsoft Windows 10 - Theme API 'ThemePack' File Parsing2020-01-29

📋Vendor Advisories

1
Microsoft
Windows Theme API Remote Code Execution Vulnerability2018-10-09
CVE-2018-8413 — Microsoft Windows 10 vulnerability | cvebase