OS-WINDOWS -- Snort has detected traffic targeting vulnerabilities in a Windows-based operating system. This does not include browser traffic or other software on the OS, but attacks against the OS itself. (such as?)
OS-WINDOWS Microsoft Windows win32k local privilege escalation attempt
This rule alerts when a binary is sent that contains bytes that correspond to anomalous/malicious activity. Specifically, when an external library (DLL) is loaded and its corresponding exported functions are searched.
What To Look For
This rule will fire when a (binary) file is downloaded from a remote server to a client. The file contains unique bytes corresponding to API calls normally used for malicious activity, corresponding to CVE-2022-21996
No public information
No known false positives
Cisco Talos Intelligence Group
MITRE ATT&CK Framework
Tactic: Privilege Escalation
Technique: Exploitation for Privilege Escalation
For reference, see the MITRE ATT&CK vulnerability types here:
Escalation of Privilege
An Escalation of Privilege (EOP) attack is any attack method that results in a user or application gaining permissions to access resources they normally would not have access to.
CVE Additional Information