OS-WINDOWS -- Snort has detected traffic targeting vulnerabilities in a Windows-based operating system. This does not include browser traffic or other software on the OS, but attacks against the OS itself.
OS-WINDOWS Microsoft Windows Win32k elevation of privilege attempt
This rule looks for executables known to exploit a use-after-free vulnerability in the user mode printer driver of the Windows Win32k kernel driver.
This rule alerts when an executable is detected that is known to exploit a privilege escalation vulnerability in the Microsoft Windows Win32k UMPD.
No public information
No known false positives
Cisco Talos Intelligence Group
No rule groups
None
No information provided
None
Tactic: Privilege Escalation
Technique: Exploitation for Privilege Escalation
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org