Vulnerability Name: | CVE-2015-1701 (CCN-102502) | ||||||||
Assigned: | 2015-04-18 | ||||||||
Published: | 2015-04-18 | ||||||||
Updated: | 2020-05-14 | ||||||||
Summary: | Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2015, aka "Win32k Elevation of Privilege Vulnerability." | ||||||||
CVSS v3 Severity: | 8.2 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C) 5.9 Medium (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
5.6 Medium (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-264 | ||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||
References: | Source: MITRE Type: CNA CVE-2015-1701 Source: FULLDISC Type: UNKNOWN 20200514 KL-001-2020-002 : Cellebrite Restricted Desktop Escape and Escalation of User Privilege Source: CCN Type: Microsoft Security Bulletin MS15-051 Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (3057191) Source: MISC Type: UNKNOWN http://twitter.com/symantec/statuses/590208710527549440 Source: BID Type: UNKNOWN 74245 Source: CCN Type: BID-74245 Microsoft Windows CVE-2015-1701 Local Privilege Escalation Vulnerability Source: SECTRACK Type: UNKNOWN 1032155 Source: MS Type: UNKNOWN MS15-051 Source: XF Type: UNKNOWN ms-win-cve20151701-priv-esc(102502) Source: CCN Type: Packet Storm Security [06-22-2015] Microsoft Windows ClientCopyImage Improper Object Handling Source: CCN Type: CYBERSECURITY & INFRASTRUCTURE SECURITY AGENCY KNOWN EXPLOITED VULNERABILITIES CATALOG Source: EXPLOIT-DB Type: UNKNOWN 37049 Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [06-24-2015] Source: EXPLOIT-DB Type: UNKNOWN 37367 Source: CCN Type: FireEye Blog April 18, 2015 Operation RussianDoll: Adobe & Windows Zero-Day Exploits Likely Leveraged by Russias APT28 in Highly-Targeted Attack Source: MISC Type: UNKNOWN https://www.fireeye.com/blog/threat-research/2015/04/probable_apt28_useo.html | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |