Rule Category

OS-WINDOWS -- Snort has detected traffic targeting vulnerabilities in a Windows-based operating system. This does not include browser traffic or other software on the OS, but attacks against the OS itself. (such as?)

Alert Message

OS-WINDOWS Microsoft Windows win32k.sys remote code execution attempt

Rule Explanation

The Windows Kernel is susceptible to vulnerable privilege escalation when an attacker attempts to call a device driver context using invalid parameters.

What To Look For

This rule is triggered when an attempt to perform a local privilege escalation against the Windows Kernel is seen.

Known Usage

No public information

False Positives

No known false positives

Contributors

Cisco Talos Intelligence Group

MITRE ATT&CK Framework

Tactic: Privilege Escalation

Technique: Access Token Manipulation

For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org

Additional Links

Rule Vulnerability

CVE Additional Information