Vulnerability Name: | CVE-2015-2524 (CCN-106047) |
Assigned: | 2015-09-08 |
Published: | 2015-09-08 |
Updated: | 2019-05-14 |
Summary: | Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 do not properly constrain impersonation levels, which allows local users to gain privileges via a crafted application, aka "Windows Task Management Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-2528.
|
CVSS v3 Severity: | 7.8 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 7.0 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): Low Privileges Required (PR): Low User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High |
|
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete | 6.8 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Athentication (Au): Single_Instance
| Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete |
|
Vulnerability Type: | CWE-264
|
Vulnerability Consequences: | Gain Privileges |
References: | Source: MITRE Type: CNA CVE-2015-2524
Source: CCN Type: Microsoft Security Bulletin MS15-102 Vulnerability in Windows Task Management Could Allow Elevation of Privilege (3089657)
Source: SECTRACK Type: Third Party Advisory, VDB Entry 1033494
Source: MS Type: Patch, Vendor Advisory MS15-102
Source: XF Type: UNKNOWN ms-taskmgmt-cve20152524-priv-esc(106047)
Source: CCN Type: Packet Storm Security [09-18-2015] Windows CreateObjectTask SettingsSyncDiagnostics Privilege Escalation
Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [09-15-2015]
Source: EXPLOIT-DB Type: Exploit, Third Party Advisory, VDB Entry 38202
|
Vulnerable Configuration: | Configuration 1: cpe:/o:microsoft:windows_10:-:*:*:*:*:*:*:*OR cpe:/o:microsoft:windows_8:-:*:*:*:*:*:*:*OR cpe:/o:microsoft:windows_8.1:-:*:*:*:*:*:*:*OR cpe:/o:microsoft:windows_rt:-:*:*:*:*:*:*:*OR cpe:/o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*OR cpe:/o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*OR cpe:/o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:* Configuration CCN 1: cpe:/o:microsoft:windows_8:-:-:-:*:-:-:x32:*OR cpe:/o:microsoft:windows_8:*:*:*:*:*:*:x64:*OR cpe:/o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*OR cpe:/o:microsoft:windows_rt:-:*:*:*:*:*:*:*OR cpe:/o:microsoft:windows_8.1:-:-:-:*:-:-:x32:*OR cpe:/o:microsoft:windows_8.1:*:*:*:*:*:*:x64:*OR cpe:/o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*OR cpe:/o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*OR cpe:/o:microsoft:windows_10:-:*:*:*:*:*:x32:*OR cpe:/o:microsoft:windows_10:*:*:*:*:*:*:x64:*
Denotes that component is vulnerable |
BACK |