FILE-EXECUTABLE -- Snort detected traffic targeting vulnerabilites that are found in or delivered through executable files, regardless of platform. In those instances, Snort is able to correct traffic that has been altered.
FILE-EXECUTABLE Microsoft Windows Win32k privilege escalation attempt
This rule will check for the transfer of a malicious exe file that attempts to exploit a win32 kernel driver in Windows 10
This rule will detect any potential attempts of a Kernel driver exploitation in Windows 10 via a maliciously crafted executable file.
No public information
No known false positives
Cisco Talos Intelligence Group
No rule groups
Escalation of Privilege
An Escalation of Privilege (EOP) attack is any attack method that results in a user or application gaining permissions to access resources they normally would not have access to.
CVE-2020-17010 |
Loading description
|
Tactic: Execution
Technique: User Execution
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org