CVE-2018-8174
HIGHCVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Lifecycle Timeline
5Tags
Description
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka "Windows VBScript Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
Analysis
The Windows VBScript engine contains a remote code execution vulnerability in object handling that allows full system compromise through crafted web pages, exploited in the wild as a zero-day before the May 2018 patch.
Technical Context
The CWE-787 out-of-bounds write in the VBScript engine (vbscript.dll) is triggered when processing crafted VBScript code that manipulates object references. The exploit uses use-after-free techniques to gain arbitrary read/write primitives, enabling full code execution. Delivered through IE or Office documents embedding VBScript.
Affected Products
['Microsoft Windows 7 through Windows 10', 'Microsoft Windows Server 2008 through Server 2016', 'Internet Explorer (VBScript engine)', 'Microsoft Office (via embedded VBScript)']
Remediation
Apply Microsoft security update. Disable VBScript in IE via registry or Group Policy. Restrict IE to trusted sites only. Use modern browsers that don't support VBScript.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today