CredSSP Remote Code Execution Vulnerability
Released: Mar 13, 2018
Last updated: May 12, 2020
- Assigning CNA
- Microsoft
- CVE.org link
- CVE-2018-0886
Executive Summary
A remote code execution vulnerability exists in the Credential Security Support Provider protocol (CredSSP). An attacker who successfully exploited this vulnerability could relay user credentials and use them to execute code on the target system.
CredSSP is an authentication provider which processes authentication requests for other applications; any application which depends on CredSSP for authentication may be vulnerable to this type of attack.
As an example of how an attacker would exploit this vulnerability against Remote Desktop Protocol, the attacker would need to run a specially crafted application and perform a man-in-the-middle attack against a Remote Desktop Protocol session. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
The security update addresses the vulnerability by correcting how Credential Security Support Provider protocol (CredSSP) validates requests during the authentication process.
To be fully protected against this vulnerability users must enable Group Policy settings on their systems and update their Remote Desktop clients. The Group Policy settings are disabled by default to prevent connectivity problems and users must follow the instructions documented HERE to be fully protected.
Exploitability
The following table provides an exploitability assessment for this vulnerability at the time of original publication.
- Publicly disclosed
- No
- Exploited
- No
- Exploitability assessment
- Exploitation Less Likely
FAQ
I am running Windows 10 Version 1511, and the May 2018 security update is not available for this version of Windows 10. How do I protect my system from this vulnerability?
Windows 10 Version 1511 reached end of service on April 10, 2018. If you are unable to update to a newer version of Windows 10, after installing security update 4099779 that was released on March 13, 2018 you can use the included Group Policy settings or registry-based equivalents to manage the setting options on the client and server computers. See Microsoft Knowledge Base article 4093492 for more information.
Acknowledgements
- Eyal Karni, Yaron Zinar, Roman Blachman @ Preempt, Research Labs
Security Updates
To determine the support lifecycle for your software, see the Microsoft Support Lifecycle.
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
Disclaimer
Revisions
Added supported editions of Microsoft Windows to the Security Updates table because they are affected by this vulnerability. Microsoft recommends that customers running any of these editions of Windows install the latest security updates to be fully protected from this vulnerability.
In the Affected Products table, reverted the security update entries for Windows 10 Version 1511 back to the March security update (4088779) because a May 2018 update is not available for this version. See the FAQ section for more information about how to be protected from this vulnerability if you are running Windows 10 Version 1511.
Microsoft is releasing new Windows security updates to address this CVE on May 8, 2018. The updates released in March did not enforce the new version of the Credential Security Support Provider protocol. These security updates do make the new version mandatory. For more information see "CredSSP updates for CVE-2018-0886" located at https://support.microsoft.com/en-us/help/4093492.
Information published.