CVE-2018-8256
high-risk
Published 2018-11-14
A remote code execution vulnerability exists when PowerShell improperly handles specially crafted files, aka "Microsoft PowerShell Remote Code Execution Vulnerability." This affects Windows RT 8.1, PowerShell Core 6.0, Microsoft.PowerShell.Archive 1.2.2.0, Windows Server 2016, Windows Server 2012, Windows Server 2008 R2, Windows Server 2019, Windows 7, Windows Server 2012 R2, PowerShell Core 6.1, Windows 10 Servers, Windows 10, Windows 8.1.
Do I need to act?
!
32.5% chance of exploitation in next 30 days
EPSS score — higher than 68% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Products (20)
Affected Vendors
References (6)
Third Party Advisory
http://www.securityfocus.com/bid/105781
Third Party Advisory
http://www.securitytracker.com/id/1042108
Third Party Advisory
http://www.securityfocus.com/bid/105781
Third Party Advisory
http://www.securitytracker.com/id/1042108
66
/ 100
high-risk
Severity
30/34 · Critical
Exploitability
16/34 · Moderate
Exposure
20/34 · Moderate