Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2018-10098 : Security Advisory and Response

Learn about CVE-2018-10098, a vulnerability in MicroWorld eScan Internet Security Suite (ISS) for Business 14.0.1400.2029 that allows a non-privileged user to trigger a denial of service (BSOD).

MicroWorld eScan Internet Security Suite (ISS) for Business 14.0.1400.2029 is vulnerable to a denial of service attack that can be triggered by a non-privileged user. This CVE was published on July 13, 2018.

Understanding CVE-2018-10098

This CVE describes a vulnerability in MicroWorld eScan Internet Security Suite (ISS) for Business 14.0.1400.2029 that allows an unauthorized user to cause a denial of service (BSOD) by sending a specific IOCTL request to the driver econceal.sys.

What is CVE-2018-10098?

CVE-2018-10098 is a security vulnerability in MicroWorld eScan Internet Security Suite (ISS) for Business 14.0.1400.2029 that enables a non-privileged user to trigger a denial of service by sending a particular IOCTL request to the driver econceal.sys.

The Impact of CVE-2018-10098

Exploiting this vulnerability can lead to a denial of service condition, resulting in a Blue Screen of Death (BSOD) on the affected system.

Technical Details of CVE-2018-10098

MicroWorld eScan Internet Security Suite (ISS) for Business 14.0.1400.2029 is susceptible to the following:

Vulnerability Description

The driver econceal.sys in MicroWorld eScan ISS for Business 14.0.1400.2029 allows a non-privileged user to send a specific IOCTL request to \.\econceal, leading to a denial of service (BSOD).

Affected Systems and Versions

        Product: MicroWorld eScan Internet Security Suite (ISS) for Business 14.0.1400.2029
        Vendor: Not applicable
        Version: Not applicable

Exploitation Mechanism

An unauthorized user can exploit this vulnerability by sending a 0x830020E0 IOCTL request to \.\econceal using the driver econceal.sys.

Mitigation and Prevention

To address CVE-2018-10098, consider the following steps:

Immediate Steps to Take

        Apply vendor patches or updates if available.
        Monitor vendor communications for security advisories.

Long-Term Security Practices

        Regularly update and patch all software and systems.
        Implement the principle of least privilege to restrict user access.

Patching and Updates

        Check for patches or updates from MicroWorld eScan for the affected version.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now