CISA KEV 정보
| 취약점명 | Microsoft Win32k Privilege Escalation Vulnerability |
|---|---|
| 설명 | An unspecified vulnerability exists in the Win32k.sys kernel-mode driver in Microsoft Windows Server that allows a local attacker to execute arbitrary code with elevated privileges. |
| 조치사항 | Apply updates per vendor instructions. |
| 랜섬웨어 캠페인 악용 | Known |
| CWE | CWE-264 |
| 등록일 (KEV) | 2022-03-03 |
| 조치 기한 | 2022-03-24 |
| 추가 참고 | https://nvd.nist.gov/vuln/detail/CVE-2015-1701 |
NVD 상세 정보
CVSS v3.1: 7.8 HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HCVSS v2.0: 7.2
AV:L/AC:L/Au:N/C:C/I:C/A:C설명: Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2015, aka "Win32k Elevation of Privilege Vulnerability."
참조
- http://seclists.org/fulldisclosure/2020/May/34 [Mailing List, Third Party Advisory]
- http://twitter.com/symantec/statuses/590208710527549440 [Press/Media Coverage]
- http://www.securityfocus.com/bid/74245 [Broken Link, Third Party Advisory, VDB Entry]
- http://www.securitytracker.com/id/1032155 [Broken Link, Third Party Advisory, VDB Entry]
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-051 [Patch, Vendor Advisory]
- https://www.exploit-db.com/exploits/37049/ [Exploit, Third Party Advisory, VDB Entry]
- https://www.exploit-db.com/exploits/37367/ [Exploit, Third Party Advisory, VDB Entry]
- https://www.fireeye.com/blog/threat-research/2015/04/probable_apt28_useo.html [Third Party Advisory]
- http://seclists.org/fulldisclosure/2020/May/34 [Mailing List, Third Party Advisory]
- http://twitter.com/symantec/statuses/590208710527549440 [Press/Media Coverage]
- http://www.securityfocus.com/bid/74245 [Broken Link, Third Party Advisory, VDB Entry]
- http://www.securitytracker.com/id/1032155 [Broken Link, Third Party Advisory, VDB Entry]
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-051 [Patch, Vendor Advisory]
- https://www.exploit-db.com/exploits/37049/ [Exploit, Third Party Advisory, VDB Entry]
- https://www.exploit-db.com/exploits/37367/ [Exploit, Third Party Advisory, VDB Entry]
- ... 외 2건
This product uses the NVD API but is not endorsed or certified by the NVD.