Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-8174

KEV · Ransomware EPSS 94.28% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2018-8174

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka "Windows VBScript Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Windows VBScript引擎缓冲区错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft Windows 7等都是美国微软(Microsoft)公司发布的一系列操作系统。Windows VBScript engine是其中的一个VBScript(脚本语言)引擎。 Microsoft Windows VBScript引擎中存在远程代码执行漏洞。远程攻击者可利用该漏洞在当前用户的上下文中执行任意代码,造成内存损坏。以下系统版本受到影响:Microsoft Windows 7,Windows Server 2012 R2,Windows RT 8.1,Windows Server
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
MicrosoftWindows 7 32-bit Systems Service Pack 1 -
MicrosoftWindows Server 2012 R2 (Server Core installation) -
MicrosoftWindows RT 8.1 Windows RT 8.1 -
MicrosoftWindows Server 2008 32-bit Systems Service Pack 2 -
MicrosoftWindows Server 2012 (Server Core installation) -
MicrosoftWindows 8.1 32-bit systems -
MicrosoftWindows Server 2016 (Server Core installation) -
MicrosoftWindows Server 2008 R2 Itanium-Based Systems Service Pack 1 -
MicrosoftWindows 10 32-bit Systems -
MicrosoftWindows 10 Servers version 1709 (Server Core Installation) -

II. Public POCs for CVE-2018-8174

#POC DescriptionSource LinkShenlong Link
1CVE-2018-8174 - VBScript memory corruption exploit.https://github.com/0x09AL/CVE-2018-8174-msfPOC Details
2CVE-2018-8174_pythonhttps://github.com/Yt1g3r/CVE-2018-8174_EXPPOC Details
3MS Word MS WordPad via IE VBS Engine RCE https://github.com/SyFi/CVE-2018-8174POC Details
4Rig Exploit for CVE-2018-8174 As with its previous campaigns, Rig’s Seamless campaign uses malvertising. In this case, the malvertisements have a hidden iframe that redirects victims to Rig’s landing page, which includes an exploit for CVE-2018-8174 and shellcode. This enables remote code execution of the shellcode obfuscated in the landing page. After successful exploitation, a second-stage downloader is retrieved, which appears to be a variant of SmokeLoader due to the URL. It would then download the final payload, a Monero miner.https://github.com/orf53975/Rig-Exploit-for-CVE-2018-8174POC Details
5Analysis of VBS exploit CVE-2018-8174https://github.com/piotrflorczyk/cve-2018-8174_analysisPOC Details
6Nonehttps://github.com/likescam/CVE-2018-8174-msfPOC Details
7Nonehttps://github.com/ericisnotrealname/CVE-2018-8174_EXPPOC Details
8Nonehttps://github.com/www201001/https-github.com-iBearcat-CVE-2018-8174_EXPPOC Details
9Nonehttps://github.com/www201001/https-github.com-iBearcat-CVE-2018-8174_EXP.git-POC Details
10Nonehttps://github.com/delina1/CVE-2018-8174POC Details
11Nonehttps://github.com/delina1/CVE-2018-8174_EXPPOC Details
12Nonehttps://github.com/DarkFlameMaster-bit/CVE-2018-8174_EXPPOC Details
13Nonehttps://github.com/lisinan988/CVE-2018-8174-expPOC Details
14Nonehttps://github.com/sinisterghost/https-github.com-iBearcat-CVE-2018-8174_EXPPOC Details
15Nonehttps://github.com/likekabin/CVE-2018-8174-msfPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2018-8174

登录查看更多情报信息。

Same Patch Batch · Microsoft · 2018-05-09 · 60 CVEs total

CVE-2018-8152Microsoft Exchange Server 权限许可和访问控制问题漏洞
CVE-2018-8178Microsoft ChakraCore、Edge和Internet Explorer 缓冲区错误漏洞
CVE-2018-8170Microsoft Windows kernel image 权限许可和访问控制问题漏洞
CVE-2018-8168Microsoft SharePoint Enterprise Server和SharePoint Server 权限许可和访问控制漏洞
CVE-2018-8167Microsoft Windows Common Log File System驱动程序权限许可和访问控制问题漏洞
CVE-2018-8173Microsoft InfoPath 缓冲区错误漏洞
CVE-2018-8156Microsoft SharePoint Server和Project Server 权限许可和访问控制漏洞
CVE-2018-8155Microsoft SharePoint Enterprise Server和SharePoint Foundation 权限许可和访问控制漏洞
CVE-2018-8154Microsoft Exchange 缓冲区错误漏洞
CVE-2018-8153Microsoft Exchange Server 输入验证错误漏洞
CVE-2018-8157Microsoft Office 缓冲区错误漏洞
CVE-2018-8151Microsoft Exchange 信息泄露漏洞
CVE-2018-8150Microsoft Office Outlook 安全漏洞
CVE-2018-8149Microsoft SharePoint Server 权限许可和访问控制漏洞
CVE-2018-8148Microsoft Excel 缓冲区错误漏洞
CVE-2018-8147Microsoft Excel 缓冲区错误漏洞
CVE-2018-8145Microsoft ChakraCore、Edge和Internet Explorer 信息泄露漏洞
CVE-2018-8141Microsoft Windows Kernel 信息泄露漏洞
CVE-2018-8139Microsoft ChakraCore和Microsoft Windows Edge 缓冲区错误漏洞
CVE-2018-8137Microsoft ChakraCore和Edge 缓冲区错误漏洞

Showing top 20 of 60 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2018-8174

No comments yet


Leave a comment