CNVD-2018-26102
Vulnerability from cnvd - Published: 2018-12-21
VLAI Severity ?
Title
Windows10 Fall Creators Update Modify module for Security Measures tool安装程序代码执行漏洞
Description
Windows10 Fall Creators Update Modify module for Security Measures tool是一款Windows10 Fall Creators安全工具。installer是它的安装程序。
Windows10 Fall Creators Update Modify module for Security Measures tool中的安装程序存在代码执行漏洞,攻击者可利用该漏洞以调用该安装程序的用户权限执行任意代码。
Severity
中
Formal description
厂商尚未提供漏洞修复方案,请关注厂商主页更新: https://f-security.jp/
Reference
https://jvndb.jvn.jp/en/contents/2018/JVNDB-2018-000118.html
Impacted products
| Name | Microsoft Windows10 Fall Creators Update Modify module for Security Measures tool |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2018-16177"
}
},
"description": "Windows10 Fall Creators Update Modify module for Security Measures tool\u662f\u4e00\u6b3eWindows10 Fall Creators\u5b89\u5168\u5de5\u5177\u3002installer\u662f\u5b83\u7684\u5b89\u88c5\u7a0b\u5e8f\u3002\n\nWindows10 Fall Creators Update Modify module for Security Measures tool\u4e2d\u7684\u5b89\u88c5\u7a0b\u5e8f\u5b58\u5728\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u4ee5\u8c03\u7528\u8be5\u5b89\u88c5\u7a0b\u5e8f\u7684\u7528\u6237\u6743\u9650\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002",
"discovererName": "Tomohisa Hasegawa",
"formalWay": "\u5382\u5546\u5c1a\u672a\u63d0\u4f9b\u6f0f\u6d1e\u4fee\u590d\u65b9\u6848\uff0c\u8bf7\u5173\u6ce8\u5382\u5546\u4e3b\u9875\u66f4\u65b0\uff1a\r\nhttps://f-security.jp/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2018-26102",
"openTime": "2018-12-21",
"products": {
"product": "Microsoft Windows10 Fall Creators Update Modify module for Security Measures tool"
},
"referenceLink": "https://jvndb.jvn.jp/en/contents/2018/JVNDB-2018-000118.html",
"serverity": "\u4e2d",
"submitTime": "2018-11-13",
"title": "Windows10 Fall Creators Update Modify module for Security Measures tool\u5b89\u88c5\u7a0b\u5e8f\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…