Описание
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
FAQ
What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker could use this vulnerability to elevate privileges from a Low Integrity Level in a contained ("sandboxed") execution environment to a Medium Integrity Level or a High Integrity Level.
Please refer to AppContainer isolation and Mandatory Integrity Control for more information.
Обновления
Продукт | Статья | Обновление |
---|---|---|
Windows Server 2016 | ||
Windows 10 Version 1607 for 32-bit Systems | ||
Windows 10 Version 1607 for x64-based Systems | ||
Windows Server 2016 (Server Core installation) | ||
Windows 10 Version 1809 for 32-bit Systems | ||
Windows 10 Version 1809 for x64-based Systems | ||
Windows Server 2019 | ||
Windows Server 2019 (Server Core installation) | ||
Windows Server 2022 | ||
Windows Server 2022 (Server Core installation) |
Показывать по
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
DOS
EPSS
7.8 High
CVSS3
Связанные уязвимости
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
Уязвимость драйвера режима ядра операционных систем Windows, позволяющая нарушителю повысить свои привилегии
EPSS
7.8 High
CVSS3