VULNERABILITY

Microsoft CVE-2018-0886: CredSSP Remote Code Execution Vulnerability

Try Surface Command Get a continuous 360° view of your attack surface
Back to Search

Microsoft CVE-2018-0886: CredSSP Remote Code Execution Vulnerability

Severity
8
CVSS
(AV:N/AC:H/Au:N/C:C/I:C/A:C)
Published
03/13/2018
Created
07/25/2018
Added
06/09/2020
Modified
11/18/2021

Description

A remote code execution vulnerability exists in the Credential Security Support Provider protocol (CredSSP). An attacker who successfully exploited this vulnerability could relay user credentials and use them to execute code on the target system. CredSSP is an authentication provider which processes authentication requests for other applications; any application which depends on CredSSP for authentication may be vulnerable to this type of attack. As an example of how an attacker would exploit this vulnerability against Remote Desktop Protocol, the attacker would need to run a specially crafted application and perform a man-in-the-middle attack against a Remote Desktop Protocol session. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. The security update addresses the vulnerability by correcting how Credential Security Support Provider protocol (CredSSP) validates requests during the authentication process. To be fully protected against this vulnerability users must enable Group Policy settings on their systems and update their Remote Desktop clients. The Group Policy settings are disabled by default to prevent connectivity problems and users must follow the instructions documented HERE to be fully protected.

Solution(s)

  • msft-kb4056564-0d5e0ad0-f304-484b-97ab-3cf8e691beb7-cve-2018-0886
  • msft-kb4056564-b05ea6da-27b6-4304-a1f1-b19af3050f2b-cve-2018-0886
  • msft-kb4056564-b317cee6-38f0-4a82-8c6f-cc61a264629c-cve-2018-0886
  • msft-kb4056564-c7348db8-b754-4d3e-b8fc-f2ad49e7dbff-cve-2018-0886
  • msft-kb4088779-48dd1136-48ee-44c7-a573-868521eccff4
  • msft-kb4088779-c19a8868-ac70-44b1-9b6f-2d4dc02cf9ba
  • msft-kb4103712-37b5b334-c8cc-4a13-b84c-48e1bea48d6b-cve-2018-0886
  • msft-kb4103712-83a7090f-3e70-4edb-b2af-18ee3c8c8539-cve-2018-0886
  • msft-kb4103712-902c7573-12fb-4135-a2df-88d13af1d33c-cve-2018-0886
  • msft-kb4103712-c53c08ca-efac-49ab-a665-5b470f700c80-cve-2018-0886
  • msft-kb4103712-ddb1b118-50db-4654-b4d4-04cce64723ed-cve-2018-0886
  • msft-kb4103712-deb51cc8-5372-4925-a191-c02b160864d5-cve-2018-0886
  • msft-kb4103715-196f3a64-83fb-4123-a71b-3e7aa0534b4a-cve-2018-0886
  • msft-kb4103715-53738d8d-be74-4aef-ae8c-8fe6be9cd854-cve-2018-0886
  • msft-kb4103715-a0a512c2-5000-486b-bfea-655ac981bef3-cve-2018-0886
  • msft-kb4103716-34e04a3c-fab2-4a5e-b231-a37aac882e0f-cve-2018-0886
  • msft-kb4103716-8759c2a2-230b-4089-9c04-586cf2746a71-cve-2018-0886
  • msft-kb4103721-eb863932-a151-446c-8884-ab5add176f94
  • msft-kb4103721-eb863932-a151-446c-8884-ab5add176f94-cve-2018-0886
  • msft-kb4103721-f7846ea0-3bd9-48a2-b230-0be2ad24b4ea
  • msft-kb4103721-f7846ea0-3bd9-48a2-b230-0be2ad24b4ea-cve-2018-0886
  • msft-kb4103721-fdd62b2a-0e40-4c06-b153-7d2f5e45f613-cve-2018-0886
  • msft-kb4103723-54f93c06-1d96-40f5-bdc8-f9924dbcd522-cve-2018-0886
  • msft-kb4103723-99a0b90d-2519-4700-be0c-e6c7b5bd04ec-cve-2018-0886
  • msft-kb4103723-a74a9c4e-0823-4afc-8b58-cf1785a2e2b4-cve-2018-0886
  • msft-kb4103726-a7aeeaa3-5971-4250-852a-cce0d132b757-cve-2018-0886
  • msft-kb4103726-e236ef6f-7ae3-4e19-879e-9130446af0ca-cve-2018-0886
  • msft-kb4103726-fb17b3dd-c200-4335-aae4-a4fadb929428-cve-2018-0886
  • msft-kb4103727-0dae0270-e483-4c81-9914-263ec487c6c1-cve-2018-0886
  • msft-kb4103727-6108aff5-77b2-4684-b1cb-749f3c040d8f-cve-2018-0886
  • msft-kb4103727-c03178c9-b5d2-4c5f-819f-c8871513e23d-cve-2018-0886
  • msft-kb4103731-610e3534-770e-4bab-845a-0159c0645106-cve-2018-0886
  • msft-kb4103731-f80f24fa-933a-44d1-a83a-8013a727d881-cve-2018-0886
  • msft-kb4556799-2e69bf96-184c-46b9-8937-306e23bdb930
  • msft-kb4556799-7f570c23-239e-430c-b403-391861eae9a3

insightVM

Advanced vulnerability management analytics and reporting.
Key Features
  • Lightweight Endpoint Agent
  • Live Dashboards
  • Real Risk Prioritization
  • IT-Integrated Remediation Projects
  • Cloud, Virtual, and Container Assessment
  • Integrated Threat Feeds
  • Easy-to-Use RESTful API
  • Automation-Assisted Patching
  • Automated Containment
Free InsightVM Trial View All Features

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;