• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Vulnerability  /  CVE-2018-8174 – Windows VBScript Engine Remote Code Execution Vulnerability
CVE-2018-8174 – Windows VBScript Engine Remote Code Execution Vulnerability
10 May 2018

CVE-2018-8174 – Windows VBScript Engine Remote Code Execution Vulnerability

Written by Prashant Kadam
Prashant Kadam
Vulnerability

The recent zero-day vulnerability in Windows VBScript Engine (CVE-2018-8174), enables attackers to perform a remote code execution on targeted machines. Microsoft has released a security advisory CVE-2018-8174 on May 8, 2018, to address this issue. According to Microsoft, it impacts most of the Windows Operating Systems.


Seqrite detection

Seqrite’s generic detection ‘Exp.RTF.CVE-2017-0199.AO’ for Microsoft Office/WordPad exploit (CVE-2017-0199), released on December 12, 2017, detects the initial attack vector observed in the wild.

Seqrite has released the following detection for the vulnerability CVE-2018-8174:

  • Exp.IE.CVE-2018-8174
  • HTTP/CVE-2018-8174.IE

To read this post in detail, please visit

https://www.seqrite.com/blog/cve-2018-8174-windows-vbscript-engine-remote-code-execution-vulnerability/

References

https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2018-8174
https://blogs.360.cn/blog/cve-2018-8174-en/

 Previous PostHow cybersecurity laws play an important role in securing your or...
Next Post  Seqrite Endpoint Security supports the Windows 10 April 2018 Upda...
Prashant Kadam

About Prashant Kadam

Prashant Kadam is part of the HIPS (Host-based Intrusion Prevention System) team in Quick Heal Security Labs. He has worked on various security vulnerabilities...

Articles by Prashant Kadam »

Related Posts

  • Defending against APT attacks with endpoint security

    How To Defend Against Advanced Persistent Threats (APTs): A Comprehensive Approach

    September 27, 2024
  • endpoint security, endpoint protection

    The 12 Essential Features Defining Advanced Endpoint Security Solutions

    April 22, 2024
  • SideCopy’s Multi-platform Onslaught: Leveraging WinRAR Zero-Day and Linux Variant of Ares RAT

    November 6, 2023
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies