Rule Category

OS-WINDOWS -- Snort has detected traffic targeting vulnerabilities in a Windows-based operating system. This does not include browser traffic or other software on the OS, but attacks against the OS itself. (such as?)

Alert Message

OS-WINDOWS Microsoft Windows win32k local privilege escalation attempt

Rule Explanation

This rule alerts when a binary is sent that contains bytes that correspond to anomalous/malicious activity. Specifically, when an external library (DLL) is loaded and its corresponding exported functions are searched.

What To Look For

This rule will fire when a (binary) file is downloaded from a remote server to a client. The file contains unique bytes corresponding to API calls normally used for malicious activity, corresponding to CVE-2022-21996

Known Usage

No public information

False Positives

No known false positives


Cisco Talos Intelligence Group

MITRE ATT&CK Framework

Tactic: Privilege Escalation

Technique: Exploitation for Privilege Escalation

For reference, see the MITRE ATT&CK vulnerability types here:

Additional Links

Rule Vulnerability

Escalation of Privilege

An Escalation of Privilege (EOP) attack is any attack method that results in a user or application gaining permissions to access resources they normally would not have access to.

CVE Additional Information