vulnerability

Microsoft CVE-2018-8356: .NET Framework Security Feature Bypass Vulnerability

Severity
2
CVSS
(AV:L/AC:L/Au:N/C:N/I:P/A:N)
Published
Jul 10, 2018
Added
Jan 1, 2019
Modified
Nov 18, 2021

Description

A security feature bypass vulnerability exists when Microsoft .NET Framework components do not correctly validate certificates.
An attacker could present expired certificates when challenged.
The security update addresses the vulnerability by ensuring that .NET Framework components correctly validate certificates.

Solutions

msft-kb4338814-1d730105-0adc-48b0-b97e-f99e48b0bc43msft-kb4338814-3e8fbcc4-12ae-46d7-a550-98b36cf04be3microsoft-windows-windows_server_2016-1607-kb4338814msft-kb4338819-08527cb0-be58-4d15-8f32-45fb469e1e20msft-kb4338819-a4a592f3-8cbf-465f-a51a-63e0e57ec72bmsft-kb4338825-0839cfd6-8d2d-4902-86f9-c500c8c2012emsft-kb4338825-b4d83549-b9d9-476e-a185-2cbcac3e6da5msft-kb4338826-5631f856-d323-46c6-9315-6009b1e15264msft-kb4338826-68816a0f-47c2-40da-b3cd-f46bc468546emsft-kb4338829-65462f35-2ae0-49e0-8271-65ae301cb886msft-kb4338829-b156d204-e2b4-4f8a-baba-c2501be2b4c2msft-kb4340004-42d4ff80-e017-4510-bc88-c6a49003c249-kb4338612msft-kb4340004-4f350cf0-b8ff-45b2-a827-b25c97690227-kb4338602msft-kb4340004-4f350cf0-b8ff-45b2-a827-b25c97690227-kb4338606msft-kb4340004-4f350cf0-b8ff-45b2-a827-b25c97690227-kb4338612msft-kb4340004-c52c0560-8129-4649-812d-08473bb26801-kb4338602msft-kb4340004-c52c0560-8129-4649-812d-08473bb26801-kb4338606msft-kb4340004-c52c0560-8129-4649-812d-08473bb26801-kb4338612msft-kb4340005-3740065e-5560-415c-852f-4e87a8f65ec9-kb4338601msft-kb4340005-3740065e-5560-415c-852f-4e87a8f65ec9-kb4338604msft-kb4340005-3740065e-5560-415c-852f-4e87a8f65ec9-kb4338610msft-kb4340005-5f2d4a2e-592c-489c-b34a-5747d7383afe-kb4338601msft-kb4340005-5f2d4a2e-592c-489c-b34a-5747d7383afe-kb4338604msft-kb4340005-5f2d4a2e-592c-489c-b34a-5747d7383afe-kb4338610msft-kb4340005-b1f79da3-21d0-4d7b-8e7f-3a647f40dcaf-kb4338601msft-kb4340005-b1f79da3-21d0-4d7b-8e7f-3a647f40dcaf-kb4338604msft-kb4340005-b1f79da3-21d0-4d7b-8e7f-3a647f40dcaf-kb4338610msft-kb4340006-1d638098-af3d-4ca5-84e1-db9cb0e82ae4-kb4338600msft-kb4340006-1d638098-af3d-4ca5-84e1-db9cb0e82ae4-kb4338605msft-kb4340006-1d638098-af3d-4ca5-84e1-db9cb0e82ae4-kb4338613msft-kb4340006-9bbe52b5-b346-48c9-9be1-fa3d6b2c9f59-kb4338600msft-kb4340006-9bbe52b5-b346-48c9-9be1-fa3d6b2c9f59-kb4338605msft-kb4340006-9bbe52b5-b346-48c9-9be1-fa3d6b2c9f59-kb4338613msft-kb4340007-60c67276-e466-4787-bfe5-b942449e1765-kb4338602msft-kb4340007-60c67276-e466-4787-bfe5-b942449e1765-kb4338606msft-kb4340007-60c67276-e466-4787-bfe5-b942449e1765-kb4338611msft-kb4340007-6d676aaa-eff2-46a0-bf93-4bd5843dad4b-kb4338602msft-kb4340007-6d676aaa-eff2-46a0-bf93-4bd5843dad4b-kb4338606msft-kb4340007-6d676aaa-eff2-46a0-bf93-4bd5843dad4b-kb4338611msft-kb4340007-b591d691-0009-4dae-a3da-703d00733039-kb4338611

References

    Title
    NEW

    Explore Exposure Command

    Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.