The Credential Security Support Provider protocol (CredSSP) in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709 Windows Server 2016 and Windows Server, version 1709 allows a remote code execution vulnerability due to how CredSSP validates request during the authentication process, aka "CredSSP Remote Code Execution Vulnerability".
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
http://www.securitytracker.com/id/1040506 | third party advisory vdb entry |
http://www.securityfocus.com/bid/103265 | third party advisory vdb entry |
https://ics-cert.us-cert.gov/advisories/ICSA-18-198-03 | third party advisory us government resource |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0886 | patch vendor advisory |
https://blog.preempt.com/security-advisory-credssp | third party advisory exploit |
https://www.exploit-db.com/exploits/44453/ | third party advisory vdb entry exploit |
https://github.com/preempt/credssp | third party advisory exploit |