Rapid7 Vulnerability & Exploit Database

Microsoft CVE-2018-0886: CredSSP Remote Code Execution Vulnerability

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Microsoft CVE-2018-0886: CredSSP Remote Code Execution Vulnerability

Severity
8
CVSS
(AV:N/AC:H/Au:N/C:C/I:C/A:C)
Published
03/13/2018
Created
07/25/2018
Added
06/09/2020
Modified
11/18/2021

Description

A remote code execution vulnerability exists in the Credential Security Support Provider protocol (CredSSP). An attacker who successfully exploited this vulnerability could relay user credentials and use them to execute code on the target system. CredSSP is an authentication provider which processes authentication requests for other applications; any application which depends on CredSSP for authentication may be vulnerable to this type of attack. As an example of how an attacker would exploit this vulnerability against Remote Desktop Protocol, the attacker would need to run a specially crafted application and perform a man-in-the-middle attack against a Remote Desktop Protocol session. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. The security update addresses the vulnerability by correcting how Credential Security Support Provider protocol (CredSSP) validates requests during the authentication process. To be fully protected against this vulnerability users must enable Group Policy settings on their systems and update their Remote Desktop clients. The Group Policy settings are disabled by default to prevent connectivity problems and users must follow the instructions documented HERE to be fully protected.

Solution(s)

  • msft-kb4056564-0d5e0ad0-f304-484b-97ab-3cf8e691beb7-cve-2018-0886
  • msft-kb4056564-b05ea6da-27b6-4304-a1f1-b19af3050f2b-cve-2018-0886
  • msft-kb4056564-b317cee6-38f0-4a82-8c6f-cc61a264629c-cve-2018-0886
  • msft-kb4056564-c7348db8-b754-4d3e-b8fc-f2ad49e7dbff-cve-2018-0886
  • msft-kb4088779-48dd1136-48ee-44c7-a573-868521eccff4
  • msft-kb4088779-c19a8868-ac70-44b1-9b6f-2d4dc02cf9ba
  • msft-kb4103712-37b5b334-c8cc-4a13-b84c-48e1bea48d6b-cve-2018-0886
  • msft-kb4103712-83a7090f-3e70-4edb-b2af-18ee3c8c8539-cve-2018-0886
  • msft-kb4103712-902c7573-12fb-4135-a2df-88d13af1d33c-cve-2018-0886
  • msft-kb4103712-c53c08ca-efac-49ab-a665-5b470f700c80-cve-2018-0886
  • msft-kb4103712-ddb1b118-50db-4654-b4d4-04cce64723ed-cve-2018-0886
  • msft-kb4103712-deb51cc8-5372-4925-a191-c02b160864d5-cve-2018-0886
  • msft-kb4103715-196f3a64-83fb-4123-a71b-3e7aa0534b4a-cve-2018-0886
  • msft-kb4103715-53738d8d-be74-4aef-ae8c-8fe6be9cd854-cve-2018-0886
  • msft-kb4103715-a0a512c2-5000-486b-bfea-655ac981bef3-cve-2018-0886
  • msft-kb4103716-34e04a3c-fab2-4a5e-b231-a37aac882e0f-cve-2018-0886
  • msft-kb4103716-8759c2a2-230b-4089-9c04-586cf2746a71-cve-2018-0886
  • msft-kb4103721-eb863932-a151-446c-8884-ab5add176f94
  • msft-kb4103721-eb863932-a151-446c-8884-ab5add176f94-cve-2018-0886
  • msft-kb4103721-f7846ea0-3bd9-48a2-b230-0be2ad24b4ea
  • msft-kb4103721-f7846ea0-3bd9-48a2-b230-0be2ad24b4ea-cve-2018-0886
  • msft-kb4103721-fdd62b2a-0e40-4c06-b153-7d2f5e45f613
  • msft-kb4103721-fdd62b2a-0e40-4c06-b153-7d2f5e45f613-cve-2018-0886
  • msft-kb4103723-54f93c06-1d96-40f5-bdc8-f9924dbcd522-cve-2018-0886
  • msft-kb4103723-99a0b90d-2519-4700-be0c-e6c7b5bd04ec-cve-2018-0886
  • msft-kb4103723-a74a9c4e-0823-4afc-8b58-cf1785a2e2b4-cve-2018-0886
  • msft-kb4103726-a7aeeaa3-5971-4250-852a-cce0d132b757-cve-2018-0886
  • msft-kb4103726-e236ef6f-7ae3-4e19-879e-9130446af0ca-cve-2018-0886
  • msft-kb4103726-fb17b3dd-c200-4335-aae4-a4fadb929428-cve-2018-0886
  • msft-kb4103727-0dae0270-e483-4c81-9914-263ec487c6c1-cve-2018-0886
  • msft-kb4103727-6108aff5-77b2-4684-b1cb-749f3c040d8f-cve-2018-0886
  • msft-kb4103727-c03178c9-b5d2-4c5f-819f-c8871513e23d-cve-2018-0886
  • msft-kb4103731-610e3534-770e-4bab-845a-0159c0645106-cve-2018-0886
  • msft-kb4103731-f80f24fa-933a-44d1-a83a-8013a727d881-cve-2018-0886
  • msft-kb4551853-1d25cfb0-31f1-48b4-ac45-99d819a32ab7
  • msft-kb4556799-2e69bf96-184c-46b9-8937-306e23bdb930
  • msft-kb4556799-7f570c23-239e-430c-b403-391861eae9a3

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;