⚠ Actively exploited
Added to CISA KEV on 2022-03-28. Federal agencies required to patch by 2022-04-21. Required action: Apply updates per vendor instructions..

CVE-2010-4398Out-of-bounds Write in Microsoft Windows Server 2008

Severity
7.8HIGHNVD
EPSS
6.4%
top 8.94%
CISA KEV
KEV
Added 2022-03-28
Due 2022-04-21
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedDec 6
KEV addedMar 28
KEV dueApr 21
Latest updateOct 17
CISA Required Action: Apply updates per vendor instructions.

Description

Stack-based buffer overflow in the RtlQueryRegistryValues function in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows local users to gain privileges, and bypass the User Account Control (UAC) feature, via a crafted REG_BINARY value for a SystemDefaultEUDCFont registry key, aka "Driver Improper Interaction with Windows Kernel Vulnerability."

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages1 packages

Patches

🔴Vulnerability Details

2
GHSA
GHSA-v6fx-3qcr-2mfg: Stack-based buffer overflow in the RtlQueryRegistryValues function in win32k2022-05-14
VulnCheck
Microsoft Windows Kernel Stack-Based Buffer Overflow Vulnerability2010

💥Exploits & PoCs

1
Exploit-DB
Microsoft Windows Vista/7 - Local Privilege Escalation (UAC Bypass)2010-11-24

📋Vendor Advisories

1
CISA
Microsoft Windows Kernel Stack-Based Buffer Overflow Vulnerability2022-03-28

🕵️Threat Intelligence

3
Securelist
SAS CTF and the many ways to persist a kernel shellcode on Windows 72024-10-17
Securelist
Kernel shellcode persistence technique in APT attacks and SAS CTF challenge2024-10-17
Threat Intel
FIN6 (FIN6, Magecart Group 6, ITG08)