OS-WINDOWS -- Snort has detected traffic targeting vulnerabilities in a Windows-based operating system. This does not include browser traffic or other software on the OS, but attacks against the OS itself.
OS-WINDOWS Microsoft Windows win32k local privilege escalation attempt
This rule alerts when a binary is sent that contains bytes that correspond to anomalous/malicious activity. Specifically, when an external library (DLL) is loaded and its corresponding exported functions are searched.
This rule will trigger when a binary is sent via SMTP to a mail server. Said binary should correspond to highly anomalous/malicious activity
No public information
No known false positives
Cisco Talos Intelligence Group
No rule groups
Escalation of Privilege
An Escalation of Privilege (EOP) attack is any attack method that results in a user or application gaining permissions to access resources they normally would not have access to.
CVE-2022-21996 |
Loading description ![]() |
Tactic: Privilege Escalation
Technique: Exploitation for Privilege Escalation
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org