CVE-2018-8599 - Improper Check for Dropped Privileges

Severity

46%

Complexity

39%

Confidentiality

106%

An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector Service improperly impersonates certain file operations, aka "Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability." This affects Microsoft Visual Studio, Windows Server 2019, Windows Server 2016, Windows 10, Windows 10 Servers.

An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector Service improperly impersonates certain file operations, aka "Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability." This affects Microsoft Visual Studio, Windows Server 2019, Windows Server 2016, Windows 10, Windows 10 Servers.

CVSS 3.0 Base Score 7.8. CVSS Attack Vector: local. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

CVSS 2.0 Base Score 4.6. CVSS Attack Vector: local. CVSS Attack Complexity: low. CVSS Vector: (AV:L/AC:L/Au:N/C:P/I:P/A:P).

Demo Examples

Improper Check for Dropped Privileges

CWE-273

This code attempts to take on the privileges of a user before creating a file, thus avoiding performing the action with unnecessarily high privileges:


               
}
/../

The call to ImpersonateNamedPipeClient may fail, but the return value is not checked. If the call fails, the code may execute with higher privileges than intended. In this case, an attacker could exploit this behavior to write a file to a location that the attacker does not have access to.

Overview

Type

Microsoft

First reported 6 years ago

2018-12-12 00:29:00

Last updated 5 years ago

2019-10-03 00:03:00

Affected Software

Microsoft Visual Studio 2015 Update 3

2015

Microsoft Visual Studio 2017 15.9

15.9

Microsoft Windows 10 1703

1703

Microsoft Windows 10 1709

1709

Microsoft Windows 10 1803

1803

Microsoft Windows 10 1809

1809

Microsoft Windows Server 2016

Microsoft Windows Server 2016 1709

1709

Microsoft Windows Server 2016 1803

1803

Microsoft Windows Server 2019

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.