OS-WINDOWS -- Snort has detected traffic targeting vulnerabilities in a Windows-based operating system. This does not include browser traffic or other software on the OS, but attacks against the OS itself. (such as?)
OS-WINDOWS Microsoft Windows win32k type confusion attempt
This rule detects the attempted download of malicious software that triggers a type confusion vulnerability with vulnerable versions of the win32k kernel driver by searching for specific instructions used in the malicious software.
This rule detects the attempted download of malicious software that triggers a type confusion vulnerability with vulnerable versions of the win32k kernel driver, potentially leading to privilege escalation.
No public information
No known false positives
Cisco Talos Intelligence Group
No rule groups
CVE-2020-1253An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1207, CVE-2020-1247, CVE-2020-1251, CVE-2020-1310. |
|
Tactic: Privilege Escalation
Technique: Exploitation for Privilege Escalation
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org