{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T05:30:01.467","vulnerabilities":[{"cve":{"id":"CVE-2018-8406","sourceIdentifier":"secure@microsoft.com","published":"2018-08-15T17:29:10.157","lastModified":"2025-10-28T14:13:36.053","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"An elevation of privilege vulnerability exists when the DirectX Graphics Kernel (DXGKRNL) driver improperly handles objects in memory, aka \"DirectX Graphics Kernel Elevation of Privilege Vulnerability.\" This affects Windows Server 2016, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8400, CVE-2018-8401, CVE-2018-8405."},{"lang":"es","value":"Existe una vulnerabilidad de elevación de privilegios cuando el controlador DirectX Graphics Kernel (DXGKRNL) gestiona incorrectamente los objetos en la memoria. Esto también se conoce como \"DirectX Graphics Kernel Elevation of Privilege Vulnerability\". Esto afecta a Windows Server 2016, Windows 10 y Windows 10 Servers. El ID de este CVE es diferente de CVE-2018-8400, CVE-2018-8401 y CVE-2018-8405."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"cisaExploitAdd":"2022-03-28","cisaActionDue":"2022-04-18","cisaRequiredAction":"Apply updates per vendor instructions.","cisaVulnerabilityName":"Microsoft DirectX Graphics Kernel Privilege Escalation Vulnerability","weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-404"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-404"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*","matchCriteriaId":"A045AC0A-471E-444C-B3B0-4CABC23E8CFB"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*","matchCriteriaId":"28A7FEE9-B473-48A0-B0ED-A5CC1E44194C"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*","matchCriteriaId":"5E491E46-1917-41FE-8F9A-BB0BDDEB42C3"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*","matchCriteriaId":"0A1BC97A-263E-4291-8AEF-02EE4E6031E9"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*","matchCriteriaId":"B98DB3FF-CC3B-4E9F-A9CC-EC4C89AF3B31"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x86:*","matchCriteriaId":"8733BF37-7BF2-409D-9452-DA8A92DA1124"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*","matchCriteriaId":"469F95D3-ABBB-4F1A-A000-BE0F6BD60FF6"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*","matchCriteriaId":"D76003FB-EE99-4D8E-B6A0-B13C2041E5A0"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*","matchCriteriaId":"D82F8AF7-ED01-4649-849E-F248F0E02384"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*","matchCriteriaId":"C1CFB53B-B17B-47BD-BAC1-C6C5D168FFB6"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_1709:-:*:*:*:*:*:x64:*","matchCriteriaId":"9EFB4440-2B6B-486F-94D4-7D9C80301E51"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:x64:*","matchCriteriaId":"FD3218D1-BE39-4CEB-A88F-E715B722862B"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*","matchCriteriaId":"041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/105012","source":"secure@microsoft.com","tags":["Broken Link","Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1041461","source":"secure@microsoft.com","tags":["Broken Link","Third Party Advisory","VDB Entry"]},{"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8406","source":"secure@microsoft.com","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/105012","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1041461","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"]},{"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8406","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-8406","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]}]}}]}