CVE-2016-7255
The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold...
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- September 09, 2016
- Published Date
- November 10, 2016
- Last Updated
- February 10, 2025
- Vendor
- Microsoft
- Product
- Windows
- Description
- The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."
- Tags
- Exploitation
- active
- Technical Impact
- total
CVSS Scores
CVSS v3.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS v2.0
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
SSVC Information
References
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2021-11-03 00:00:00 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
homjxi0e/CVE-2016-7255
Type: github • Created: 2017-04-15 01:46:52 UTC • Stars: 0
FSecureLABS/CVE-2016-7255
Type: github • Created: 2017-03-02 23:32:08 UTC • Stars: 81
heh3/CVE-2016-7255
Type: github • Created: 2017-01-13 15:49:58 UTC • Stars: 3
Timeline
-
CVE ID Reserved
-
CVE Published to Public
-
Proof of Concept Exploit Available
-
Added to KEVIntel