The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

computer vulnerability bulletin CVE-2018-8599

Microsoft Visual Studio: privilege escalation via Diagnostics Hub Standard Collector Service

Synthesis of the vulnerability

An attacker can bypass restrictions via Diagnostics Hub Standard Collector Service of Microsoft Visual Studio, in order to escalate his privileges.
Vulnerable products: Visual Studio, Windows 10, Windows 2016, Windows 2019.
Severity of this weakness: 2/4.
Consequences of an attack: administrator access/rights, privileged access/rights.
Hacker's origin: user shell.
Creation date: 12/12/2018.
Références of this bulletin: CERTFR-2018-AVI-598, CVE-2018-8599, VIGILANCE-VUL-28008.

Description of the vulnerability

An attacker can bypass restrictions via Diagnostics Hub Standard Collector Service of Microsoft Visual Studio, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides a computers vulnerabilities patch. Each administrator can customize the list of products for which he wants to receive vulnerability alerts. The technology watch team tracks security threats targeting the computer system. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system.