Vulnerability Details : CVE-2018-8332
A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts, aka "Win32k Graphics Remote Code Execution Vulnerability." This affects Windows 7, Microsoft Office, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers.
Vulnerability category: Execute code
Exploit prediction scoring system (EPSS) score for CVE-2018-8332
Probability of exploitation activity in the next 30 days: 31.72%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 97 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2018-8332
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
8.8
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
References for CVE-2018-8332
-
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8332
CVE-2018-8332 | Win32k Graphics Remote Code Execution VulnerabilityPatch;Vendor Advisory
-
http://www.securityfocus.com/bid/105248
Microsoft Windows 'Win32k.sys' Graphics CVE-2018-8332 Remote Code Execution VulnerabilityThird Party Advisory;VDB Entry
-
http://www.securitytracker.com/id/1041628
Windows Font Library Embedded Font File Processing Flaw Lets Remote Users Execute Arbitrary Code - SecurityTrackerThird Party Advisory;VDB Entry
Products affected by CVE-2018-8332
- cpe:2.3:a:microsoft:office:2016:*:*:*:click-to-run:*:*:*
- cpe:2.3:o:microsoft:windows_server:2008:sp2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server:2008:r2:sp1:*:*:*:itanium:*
- cpe:2.3:o:microsoft:windows_server:2012:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server:2012:r2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server:2016:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server:2016:1803:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server:2008:r2:sp1:*:*:*:x64:*
- cpe:2.3:o:microsoft:windows_server:2016:1709:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:rt:*:*:*
- cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:office_for_mac:2016:*:*:*:*:*:*:*