Rule Category

OS-WINDOWS -- Snort has detected traffic targeting vulnerabilities in a Windows-based operating system. This does not include browser traffic or other software on the OS, but attacks against the OS itself. (such as?)

Alert Message

OS-WINDOWS Microsoft Windows NT MiOffsetToProtos NULL pointer dereference attempt

Rule Explanation

This event is generated when an attacker attempts to exploit a memory corruption in the Windows Kernel. Impact: Attempted Administrator Privilege Gain Details: This rule checks for attempts to exploit a NULL pointer dereference in the Windows Kernel nt!MiOffsetToProtos function. Ease of Attack:

What To Look For

Known Usage

No public information

False Positives

No known false positives


Cisco Talos Intelligence Group

MITRE ATT&CK Framework



For reference, see the MITRE ATT&CK vulnerability types here:


Additional Links

Rule Vulnerability

CVE Additional Information

A denial of service vulnerability exists when Windows improperly handles objects in memory, aka 'Windows Denial of Service Vulnerability'. This CVE ID is unique from CVE-2019-1346, CVE-2019-1347.
SeverityHIGH Base Score7.1
Impact Score6.9 Exploit Score8.6
Confidentiality ImpactNONE Integrity ImpactNONE
Availability ImpactCOMPLETE Access VectorNETWORK
AuthenticationNONE Ease of AccessMEDIUM