Microsoft Windows is prone to a local privilege-escalation vulnerability that occurs in the Windows kernel.
A local attacker can exploit this issue to execute arbitrary code in kernel mode with elevated privileges.
Information
Microsoft Windows Vista SP2
Microsoft Windows Server 2016 for x64-based Systems 0
Microsoft Windows Server 2012 R2 0
Microsoft Windows Server 2012 0
Microsoft Windows Server 2008 R2 for x64-based Systems SP1
Microsoft Windows Server 2008 R2 for Itanium-based Systems SP1
Microsoft Windows Server 2008 for x64-based Systems SP2
Microsoft Windows Server 2008 for Itanium-based Systems SP2
Microsoft Windows Server 2008 for 32-bit Systems SP2
Microsoft Windows RT 8.1
Microsoft Windows 8.1 for x64-based Systems 0
Microsoft Windows 8.1 for 32-bit Systems 0
Microsoft Windows 7 for x64-based Systems SP1
Microsoft Windows 7 for 32-bit Systems SP1
Microsoft Windows 10 Version 1607 for x64-based Systems 0
Microsoft Windows 10 Version 1607 for 32-bit Systems 0
Microsoft Windows 10 version 1511 for x64-based Systems 0
Microsoft Windows 10 version 1511 for 32-bit Systems 0
Microsoft Windows 10 for x64-based Systems 0
Microsoft Windows 10 for 32-bit Systems 0
Exploit
Reports indicate that this issue is being exploited in the wild.
This vulnerability is being exploited as part of the cyber espionage campaign identified in Symantec MATI report SYMC - 300532.
The following exploit code is available:
References:
- Disclosing vulnerabilities to protect users (Google)
- Microsoft Homepage (Microsoft)
- Microsoft Security Bulletin MS16-135 (Microsoft)