OS-WINDOWS -- Snort has detected traffic targeting vulnerabilities in a Windows-based operating system. This does not include browser traffic or other software on the OS, but attacks against the OS itself. (such as?)
OS-WINDOWS Microsoft Windows Win32k driver privilege escalation attempt
This rule looks for specially crafted executables which exploit a privilege escalation vulnerability in Microsoft Windows Win32k driver.
This rule alerts when specially crafted executables, which exploit a privilege escalation vulnerability in Microsoft Windows, are detected.
No public information
No known false positives
Cisco Talos Intelligence Group
Tactic: Privilege Escalation
Technique: Exploitation for Privilege Escalation
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org
Escalation of Privilege
An Escalation of Privilege (EOP) attack is any attack method that results in a user or application gaining permissions to access resources they normally would not have access to.