Описание
Windows Secure Kernel Mode Elevation of Privilege Vulnerability
FAQ
What architecture(s) are impacted by this vulnerability?
This vulnerability impacts ARM64 only.
How could an attacker exploit this vulnerability and what privileges could an attacker gain?
An authenticated attacker could escalate privileges to Secure Kernel by overwriting the page table data meant for the kernel.
Обновления
Продукт | Статья | Обновление |
---|---|---|
Windows 10 Version 21H2 for 32-bit Systems | ||
Windows 10 Version 21H2 for ARM64-based Systems | ||
Windows 10 Version 21H2 for x64-based Systems | ||
Windows 11 Version 22H2 for ARM64-based Systems | ||
Windows 11 Version 22H2 for x64-based Systems | ||
Windows 10 Version 22H2 for x64-based Systems | ||
Windows 10 Version 22H2 for ARM64-based Systems | ||
Windows 10 Version 22H2 for 32-bit Systems | ||
Windows 11 Version 23H2 for ARM64-based Systems | ||
Windows 11 Version 23H2 for x64-based Systems |
Показывать по
10
Возможность эксплуатации
Publicly Disclosed
No
Exploited
No
Latest Software Release
Exploitation Less Likely
DOS
N/A
EPSS
Процентиль: 63%
0.00451
Низкий
7.8 High
CVSS3
Связанные уязвимости
CVSS3: 7.8
nvd
5 месяцев назад
Windows Secure Kernel Mode Elevation of Privilege Vulnerability
CVSS3: 7.8
github
5 месяцев назад
Windows Secure Kernel Mode Elevation of Privilege Vulnerability
CVSS3: 7.8
fstec
5 месяцев назад
Уязвимость механизма Windows Secure Kernel Mode операционной системы Windows, позволяющая нарушителю повысить свои привилегии
EPSS
Процентиль: 63%
0.00451
Низкий
7.8 High
CVSS3