CISA KEV 정보
| 취약점명 | Microsoft Windows Kernel Privilege Escalation Vulnerability |
|---|---|
| 설명 | A privilege escalation vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. |
| 조치사항 | Apply updates per vendor instructions. |
| 랜섬웨어 캠페인 악용 | Known |
| CWE | CWE-264 |
| 등록일 (KEV) | 2022-03-15 |
| 조치 기한 | 2022-04-05 |
| 추가 참고 | https://nvd.nist.gov/vuln/detail/CVE-2016-3309 |
NVD 상세 정보
CVSS v3.1: 7.8 HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HCVSS v2.0: 7.2
AV:L/AC:L/Au:N/C:C/I:C/A:C설명: The kernel-mode drivers in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-3308, CVE-2016-3310, and CVE-2016-3311.
참조
- http://www.securityfocus.com/bid/92297 [Broken Link, Third Party Advisory, VDB Entry]
- http://www.securitytracker.com/id/1036572 [Broken Link, Third Party Advisory, VDB Entry]
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-098 [Patch, Vendor Advisory]
- https://www.exploit-db.com/exploits/42960/ [Third Party Advisory, VDB Entry]
- http://www.securityfocus.com/bid/92297 [Broken Link, Third Party Advisory, VDB Entry]
- http://www.securitytracker.com/id/1036572 [Broken Link, Third Party Advisory, VDB Entry]
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-098 [Patch, Vendor Advisory]
- https://www.exploit-db.com/exploits/42960/ [Third Party Advisory, VDB Entry]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-3309
This product uses the NVD API but is not endorsed or certified by the NVD.