6.9 Medium
AI Score
Confidence
Low
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.005 Low
EPSS
Percentile
76.6%
Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2015, aka “Win32k Elevation of Privilege Vulnerability.”
CPE | Name | Operator | Version |
---|---|---|---|
windows_server_2008 | eq | - sp2 |
seclists.org/fulldisclosure/2020/May/34
www.securityfocus.com/bid/74245
www.securitytracker.com/id/1032155
docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-051
twitter.com/symantec/statuses/590208710527549440
www.exploit-db.com/exploits/37049/
www.exploit-db.com/exploits/37367/
www.fireeye.com/blog/threat-research/2015/04/probable_apt28_useo.html