Think you have a false positive on this rule?

Sid 1-48613

Message

FILE-EXECUTABLE Microsoft Windows kernel use-after-free attempt

Summary

This event is generated when a binary that exploits a use-after-free vulnerability in the Windows kernel is detected.

Impact

Privilege escalation

CVE-2018-8611:

CVSS base score 7.8

CVSS impact score 5.9

CVSS exploitability score 1.8

Confidentiality Impact HIGH

Integrity Impact HIGH

Availability Impact HIGH

Detailed information

CVE-2018-8611: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka "Windows Kernel Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.

Affected systems

  • microsoft windows_10 -
  • microsoft windows_10 1607
  • microsoft windows_10 1703
  • microsoft windows_10 1709
  • microsoft windows_10 1803
  • microsoft windows_10 1809
  • microsoft windows_7 -
  • microsoft windows_8.1 -
  • microsoft windowsrt8.1 -
  • microsoft windowsserver2008 -
  • microsoft windowsserver2008 r2
  • microsoft windowsserver2012 -
  • microsoft windowsserver2012 r2
  • microsoft windowsserver2016 -
  • microsoft windowsserver2016 1709
  • microsoft windowsserver2016 1803
  • microsoft windowsserver2019 -

Ease of attack

CVE-2018-8611:

Access Vector

Access Complexity

Authentication

False positives

None known

False negatives

None known

Corrective action

Isolate and remediate the system according to your organization's incident response policy.

Contributors

  • Cisco Talos Intelligence Group

Additional References

  • portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2018-8611