Rule Category

OS-WINDOWS -- Snort has detected traffic targeting vulnerabilities in a Windows-based operating system. This does not include browser traffic or other software on the OS, but attacks against the OS itself. (such as?)

Alert Message

OS-WINDOWS Microsoft Windows 10 Win32k driver elevation of privileges attempt

Rule Explanation

This rule will check for the transfer of a malicious exe file that attempts to exploit a win32 kernel driver in Windows 10

What To Look For

This rule will detect any potential attempts of a Kernel driver exploitation in Windows 10 via a maliciously crafted executable file.

Known Usage

No public information

False Positives

No known false positives


Cisco Talos Intelligence Group

MITRE ATT&CK Framework

Tactic: Execution

Technique: User Execution

For reference, see the MITRE ATT&CK vulnerability types here:

Additional Links

Rule Vulnerability

CVE Additional Information