OS-WINDOWS -- Snort has detected traffic targeting vulnerabilities in a Windows-based operating system. This does not include browser traffic or other software on the OS, but attacks against the OS itself. (such as?)
OS-WINDOWS Microsoft Windows win32k.sys remote code execution attempt
The Windows Kernel is susceptible to vulnerable privilege escalation when an attacker attempts to call a device driver context using invalid parameters.
This rule is triggered when an attempt to perform a local privilege escalation against the Windows Kernel is seen.
No public information
No known false positives
Cisco Talos Intelligence Group
No rule groups
CVE-2020-1251An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1207, CVE-2020-1247, CVE-2020-1253, CVE-2020-1310. |
|
Tactic: Privilege Escalation
Technique: Access Token Manipulation
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org