CVE-2018-8134 (CNNVD-201805-279)
中文标题:
Microsoft Windows Kernel API 权限许可和访问控制问题漏洞
英文标题:
An elevation of privilege vulnerability exists in the way that the Windows Kernel API enforces permi...
漏洞描述
中文描述:
Microsoft Windows Server 2012 R2等都是美国微软(Microsoft)公司发布的操作系统。Kernel API是其中的一个内核API(应用程序接口)。 Microsoft Windows中的Kernel API强制执行权限的方式存在提权漏洞。本地攻击者可通过运行特制的应用程序利用该漏洞伪造进程,注入跨进程通信或中断系统功能。以下系统版本受到影响:Microsoft Windows Server 2012 R2,Windows RT 8.1,Windows Server 2016,Windows 8.1,Windows 10,Windows 10版本1607,Windows 10版本1703,Windows 10版本1709,Windows 10版本1803,Windows Server版本1709,Windows Server版本1803。
英文描述:
An elevation of privilege vulnerability exists in the way that the Windows Kernel API enforces permissions, aka "Windows Elevation of Privilege Vulnerability." This affects Windows Server 2012 R2, Windows RT 8.1, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Microsoft | Windows Server 2012 R2 | (Server Core installation) | - | - |
cpe:2.3:a:microsoft:windows_server_2012_r2:(server_core_installation):*:*:*:*:*:*:*
|
| Microsoft | Windows RT 8.1 | Windows RT 8.1 | - | - |
cpe:2.3:a:microsoft:windows_rt_8.1:windows_rt_8.1:*:*:*:*:*:*:*
|
| Microsoft | Windows Server 2016 | (Server Core installation) | - | - |
cpe:2.3:a:microsoft:windows_server_2016:(server_core_installation):*:*:*:*:*:*:*
|
| Microsoft | Windows 8.1 | 32-bit systems | - | - |
cpe:2.3:a:microsoft:windows_8.1:32-bit_systems:*:*:*:*:*:*:*
|
| Microsoft | Windows 8.1 | x64-based systems | - | - |
cpe:2.3:a:microsoft:windows_8.1:x64-based_systems:*:*:*:*:*:*:*
|
| Microsoft | Windows 10 | 32-bit Systems | - | - |
cpe:2.3:a:microsoft:windows_10:32-bit_systems:*:*:*:*:*:*:*
|
| Microsoft | Windows 10 | Version 1607 for 32-bit Systems | - | - |
cpe:2.3:a:microsoft:windows_10:version_1607_for_32-bit_systems:*:*:*:*:*:*:*
|
| Microsoft | Windows 10 | Version 1607 for x64-based Systems | - | - |
cpe:2.3:a:microsoft:windows_10:version_1607_for_x64-based_systems:*:*:*:*:*:*:*
|
| Microsoft | Windows 10 | Version 1703 for 32-bit Systems | - | - |
cpe:2.3:a:microsoft:windows_10:version_1703_for_32-bit_systems:*:*:*:*:*:*:*
|
| Microsoft | Windows 10 | Version 1703 for x64-based Systems | - | - |
cpe:2.3:a:microsoft:windows_10:version_1703_for_x64-based_systems:*:*:*:*:*:*:*
|
| Microsoft | Windows 10 | Version 1709 for 32-bit Systems | - | - |
cpe:2.3:a:microsoft:windows_10:version_1709_for_32-bit_systems:*:*:*:*:*:*:*
|
| Microsoft | Windows 10 | Version 1709 for x64-based Systems | - | - |
cpe:2.3:a:microsoft:windows_10:version_1709_for_x64-based_systems:*:*:*:*:*:*:*
|
| Microsoft | Windows 10 | Version 1803 for 32-bit Systems | - | - |
cpe:2.3:a:microsoft:windows_10:version_1803_for_32-bit_systems:*:*:*:*:*:*:*
|
| Microsoft | Windows 10 | Version 1803 for x64-based Systems | - | - |
cpe:2.3:a:microsoft:windows_10:version_1803_for_x64-based_systems:*:*:*:*:*:*:*
|
| Microsoft | Windows 10 | x64-based Systems | - | - |
cpe:2.3:a:microsoft:windows_10:x64-based_systems:*:*:*:*:*:*:*
|
| Microsoft | Windows 10 Servers | version 1709 (Server Core Installation) | - | - |
cpe:2.3:a:microsoft:windows_10_servers:version_1709__(server_core_installation):*:*:*:*:*:*:*
|
| Microsoft | Windows 10 Servers | version 1803 (Server Core Installation) | - | - |
cpe:2.3:a:microsoft:windows_10_servers:version_1803__(server_core_installation):*:*:*:*:*:*:*
|
| microsoft | windows_10 | - | - | - |
cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*
|
| microsoft | windows_10 | 1607 | - | - |
cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*
|
| microsoft | windows_10 | 1703 | - | - |
cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*
|
| microsoft | windows_10 | 1709 | - | - |
cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*
|
| microsoft | windows_10 | 1803 | - | - |
cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*
|
| microsoft | windows_7 | * | - | - |
cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*
|
| microsoft | windows_8.1 | * | - | - |
cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*
|
| microsoft | windows_rt_8.1 | * | - | - |
cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*
|
| microsoft | windows_server_2012 | r2 | - | - |
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
|
| microsoft | windows_server_2016 | * | - | - |
cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
|
| microsoft | windows_server_2016 | 1709 | - | - |
cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*
|
| microsoft | windows_server_2016 | 1803 | - | - |
cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2018-8134 |
2025-11-11 15:19:54 | 2025-11-11 07:35:22 |
| NVD | nvd_CVE-2018-8134 |
2025-11-11 14:55:54 | 2025-11-11 07:43:56 |
| CNNVD | cnnvd_CNNVD-201805-279 |
2025-11-11 15:10:01 | 2025-11-11 07:53:44 |
| EXPLOITDB | exploitdb_EDB-44630 |
2025-11-11 15:05:53 | 2025-11-11 08:47:13 |
版本与语言
安全公告
变更历史
查看详细变更
- references_count: 4 -> 7
- tags_count: 0 -> 3
- data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 权限许可和访问控制问题
- cnnvd_id: 未提取 -> CNNVD-201805-279
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
- cvss_score: 未提取 -> 7.0
- cvss_vector: NOT_EXTRACTED -> CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
- cvss_version: NOT_EXTRACTED -> 3.0
- affected_products_count: 17 -> 29
- data_sources: ['cve'] -> ['cve', 'nvd']