vulnerability
Microsoft CVE-2018-8202: .NET Framework Elevation of Privilege Vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | Jul 10, 2018 | Jul 10, 2018 | Nov 18, 2021 |
Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
Jul 10, 2018
Added
Jul 10, 2018
Modified
Nov 18, 2021
Description
An elevation of privilege vulnerability exists in .NET Framework which could allow an attacker to elevate their privilege level.
To exploit the vulnerability, an attacker would first have to access the local machine, and then run a malicious program.
The update addresses the vulnerability by correcting how .NET Framework activates COM objects.
Solutions
msft-kb4340007-60c67276-e466-4787-bfe5-b942449e1765-kb4338602msft-kb4340007-60c67276-e466-4787-bfe5-b942449e1765-kb4338606msft-kb4340007-60c67276-e466-4787-bfe5-b942449e1765-kb4338611msft-kb4340007-6d676aaa-eff2-46a0-bf93-4bd5843dad4b-kb4338602msft-kb4340007-6d676aaa-eff2-46a0-bf93-4bd5843dad4b-kb4338606msft-kb4340007-6d676aaa-eff2-46a0-bf93-4bd5843dad4b-kb4338611msft-kb4340007-b591d691-0009-4dae-a3da-703d00733039-kb4338611microsoft-windows-windows_server_2016-1607-kb4343887msft-kb4345679-1b11fddd-9a22-472e-a412-ef225a5de41a-kb4344167msft-kb4345679-1b11fddd-9a22-472e-a412-ef225a5de41a-kb4344173msft-kb4345679-1b11fddd-9a22-472e-a412-ef225a5de41a-kb4344177msft-kb4345679-9017e50c-8440-4320-816b-cda1493fbd6f-kb4344167msft-kb4345679-9017e50c-8440-4320-816b-cda1493fbd6f-kb4344173msft-kb4345679-9017e50c-8440-4320-816b-cda1493fbd6f-kb4344177msft-kb4345679-d0e92286-c693-47df-ab23-4e7bc83bf3a6-kb4344177msft-kb4345680-157995a0-2b42-4154-9e37-f1e0240d9a8c-kb4344165msft-kb4345680-157995a0-2b42-4154-9e37-f1e0240d9a8c-kb4344172msft-kb4345680-157995a0-2b42-4154-9e37-f1e0240d9a8c-kb4344175msft-kb4345680-7b26d6f1-937c-4171-86ab-bd89e50b5a4e-kb4344165msft-kb4345680-7b26d6f1-937c-4171-86ab-bd89e50b5a4e-kb4344172msft-kb4345680-7b26d6f1-937c-4171-86ab-bd89e50b5a4e-kb4344175msft-kb4345680-ccb830c9-1ca8-4873-8de9-8dc3b9bd6451-kb4344165msft-kb4345680-ccb830c9-1ca8-4873-8de9-8dc3b9bd6451-kb4344172msft-kb4345680-ccb830c9-1ca8-4873-8de9-8dc3b9bd6451-kb4344175msft-kb4345681-0c4e3f40-bd63-41ae-b207-af4b1b6d6735-kb4344166msft-kb4345681-0c4e3f40-bd63-41ae-b207-af4b1b6d6735-kb4344171msft-kb4345681-0c4e3f40-bd63-41ae-b207-af4b1b6d6735-kb4344178msft-kb4345681-c601cf7a-ba23-4d6d-bcdc-c61c258e7f1f-kb4344166msft-kb4345681-c601cf7a-ba23-4d6d-bcdc-c61c258e7f1f-kb4344171msft-kb4345681-c601cf7a-ba23-4d6d-bcdc-c61c258e7f1f-kb4344178msft-kb4345682-734871fb-860a-481e-ac5d-87fad8e85d04-kb4344167msft-kb4345682-734871fb-860a-481e-ac5d-87fad8e85d04-kb4344173msft-kb4345682-734871fb-860a-481e-ac5d-87fad8e85d04-kb4344176msft-kb4345682-d4b1b193-ceac-47aa-ab3f-40577650d824-kb4344176msft-kb4345682-ff3688d8-960e-4600-938d-b3322b8ddb84-kb4344167msft-kb4345682-ff3688d8-960e-4600-938d-b3322b8ddb84-kb4344173msft-kb4345682-ff3688d8-960e-4600-938d-b3322b8ddb84-kb4344176msft-kb4346877-c081ea05-365d-4209-ad75-ef48a621baa6
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.