vulnerability

Microsoft CVE-2018-8356: .NET Framework Security Feature Bypass Vulnerability

Severity
2
CVSS
(AV:L/AC:L/Au:N/C:N/I:P/A:N)
Published
Jul 10, 2018
Added
Jan 1, 2019
Modified
Nov 18, 2021

Description

A security feature bypass vulnerability exists when Microsoft .NET Framework components do not correctly validate certificates.
An attacker could present expired certificates when challenged.
The security update addresses the vulnerability by ensuring that .NET Framework components correctly validate certificates.

Solution(s)

msft-kb4338814-1d730105-0adc-48b0-b97e-f99e48b0bc43msft-kb4338814-3e8fbcc4-12ae-46d7-a550-98b36cf04be3microsoft-windows-windows_server_2016-1607-kb4338814msft-kb4338819-08527cb0-be58-4d15-8f32-45fb469e1e20msft-kb4338819-a4a592f3-8cbf-465f-a51a-63e0e57ec72bmsft-kb4338825-0839cfd6-8d2d-4902-86f9-c500c8c2012emsft-kb4338825-b4d83549-b9d9-476e-a185-2cbcac3e6da5msft-kb4338826-5631f856-d323-46c6-9315-6009b1e15264msft-kb4338826-68816a0f-47c2-40da-b3cd-f46bc468546emsft-kb4338829-65462f35-2ae0-49e0-8271-65ae301cb886msft-kb4338829-b156d204-e2b4-4f8a-baba-c2501be2b4c2msft-kb4340004-42d4ff80-e017-4510-bc88-c6a49003c249-kb4338612msft-kb4340004-4f350cf0-b8ff-45b2-a827-b25c97690227-kb4338602msft-kb4340004-4f350cf0-b8ff-45b2-a827-b25c97690227-kb4338606msft-kb4340004-4f350cf0-b8ff-45b2-a827-b25c97690227-kb4338612msft-kb4340004-c52c0560-8129-4649-812d-08473bb26801-kb4338602msft-kb4340004-c52c0560-8129-4649-812d-08473bb26801-kb4338606msft-kb4340004-c52c0560-8129-4649-812d-08473bb26801-kb4338612msft-kb4340005-3740065e-5560-415c-852f-4e87a8f65ec9-kb4338601msft-kb4340005-3740065e-5560-415c-852f-4e87a8f65ec9-kb4338604msft-kb4340005-3740065e-5560-415c-852f-4e87a8f65ec9-kb4338610msft-kb4340005-5f2d4a2e-592c-489c-b34a-5747d7383afe-kb4338601msft-kb4340005-5f2d4a2e-592c-489c-b34a-5747d7383afe-kb4338604msft-kb4340005-5f2d4a2e-592c-489c-b34a-5747d7383afe-kb4338610msft-kb4340005-b1f79da3-21d0-4d7b-8e7f-3a647f40dcaf-kb4338601msft-kb4340005-b1f79da3-21d0-4d7b-8e7f-3a647f40dcaf-kb4338604msft-kb4340005-b1f79da3-21d0-4d7b-8e7f-3a647f40dcaf-kb4338610msft-kb4340006-1d638098-af3d-4ca5-84e1-db9cb0e82ae4-kb4338600msft-kb4340006-1d638098-af3d-4ca5-84e1-db9cb0e82ae4-kb4338605msft-kb4340006-1d638098-af3d-4ca5-84e1-db9cb0e82ae4-kb4338613msft-kb4340006-9bbe52b5-b346-48c9-9be1-fa3d6b2c9f59-kb4338600msft-kb4340006-9bbe52b5-b346-48c9-9be1-fa3d6b2c9f59-kb4338605msft-kb4340006-9bbe52b5-b346-48c9-9be1-fa3d6b2c9f59-kb4338613msft-kb4340007-60c67276-e466-4787-bfe5-b942449e1765-kb4338602msft-kb4340007-60c67276-e466-4787-bfe5-b942449e1765-kb4338606msft-kb4340007-60c67276-e466-4787-bfe5-b942449e1765-kb4338611msft-kb4340007-6d676aaa-eff2-46a0-bf93-4bd5843dad4b-kb4338602msft-kb4340007-6d676aaa-eff2-46a0-bf93-4bd5843dad4b-kb4338606msft-kb4340007-6d676aaa-eff2-46a0-bf93-4bd5843dad4b-kb4338611msft-kb4340007-b591d691-0009-4dae-a3da-703d00733039-kb4338611
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.