CVE-2016-7255
The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."
Published
2016-11-10T07:00:09.460
Last Modified
2025-10-22T00:15:55.567
Status
Deferred
Source
[email protected]
Severity
CVSSv3.1: 7.8 (HIGH)
CVSSv2 Vector
AV:L/AC:L/Au:N/C:C/I:C/A:C
- Access Vector: LOCAL
- Access Complexity: LOW
- Authentication: NONE
- Confidentiality Impact: COMPLETE
- Integrity Impact: COMPLETE
- Availability Impact: COMPLETE
Exploitability Score
3.9
Impact Score
10.0
Weaknesses
-
Type: Primary
NVD-CWE-noinfo
Affected Vendors & Products
References
-
http://blog.trendmicro.com/trendlabs-security-intelligence/one-bit-rule-system-analyzing-cve-2016-7255-exploit-wild/
Broken Link
([email protected])
-
http://packetstormsecurity.com/files/140468/Microsoft-Windows-Kernel-win32k.sys-NtSetWindowLongPtr-Privilege-Escalation.html
Exploit, Third Party Advisory, VDB Entry
([email protected])
-
http://www.securityfocus.com/bid/94064
Broken Link, Third Party Advisory, VDB Entry
([email protected])
-
http://www.securitytracker.com/id/1037251
Broken Link, Third Party Advisory, VDB Entry
([email protected])
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-135
Patch, Vendor Advisory
([email protected])
-
https://github.com/mwrlabs/CVE-2016-7255
Exploit, Third Party Advisory
([email protected])
-
https://securingtomorrow.mcafee.com/mcafee-labs/digging-windows-kernel-privilege-escalation-vulnerability-cve-2016-7255/
Broken Link
([email protected])
-
https://security.googleblog.com/2016/10/disclosing-vulnerabilities-to-protect.html
Third Party Advisory
([email protected])
-
https://www.exploit-db.com/exploits/40745/
Exploit, Third Party Advisory, VDB Entry
([email protected])
-
https://www.exploit-db.com/exploits/40823/
Exploit, Third Party Advisory, VDB Entry
([email protected])
-
https://www.exploit-db.com/exploits/41015/
Exploit, Third Party Advisory, VDB Entry
([email protected])
-
http://blog.trendmicro.com/trendlabs-security-intelligence/one-bit-rule-system-analyzing-cve-2016-7255-exploit-wild/
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://packetstormsecurity.com/files/140468/Microsoft-Windows-Kernel-win32k.sys-NtSetWindowLongPtr-Privilege-Escalation.html
Exploit, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/bid/94064
Broken Link, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securitytracker.com/id/1037251
Broken Link, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-135
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/mwrlabs/CVE-2016-7255
Exploit, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://securingtomorrow.mcafee.com/mcafee-labs/digging-windows-kernel-privilege-escalation-vulnerability-cve-2016-7255/
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
https://security.googleblog.com/2016/10/disclosing-vulnerabilities-to-protect.html
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.exploit-db.com/exploits/40745/
Exploit, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.exploit-db.com/exploits/40823/
Exploit, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.exploit-db.com/exploits/41015/
Exploit, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-7255
(134c704f-9b21-4f2e-91b3-4a467353bcc0)