⚠ Actively exploited in ransomware campaigns
This vulnerability is on the CISA Known Exploited Vulnerabilities list and has been used in known ransomware attacks. CISA required action: Apply updates per vendor instructions.. Due date: 2022-04-05.

CVE-2015-2546Improper Restriction of Operations within the Bounds of a Memory Buffer in Microsoft Windows Server 2008

Severity
8.2HIGHNVD
NVD6.9
EPSS
39.8%
top 2.67%
CISA KEV
KEVRansomware
Added 2022-03-15
Due 2022-04-05
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedSep 9
KEV addedMar 15
KEV dueApr 5
Latest updateFeb 12
CISA Required Action: Apply updates per vendor instructions.

Description

The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows local users to gain privileges via a crafted application, aka "Win32k Memory Corruption Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-2511, CVE-2015-2517, and CVE-2015-2518.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:HExploitability: 1.5 | Impact: 6.0

Affected Packages1 packages

Patches

🔴Vulnerability Details

5
GHSA
GHSA-5c8h-c2cj-96mm: The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 82022-05-14
GHSA
GHSA-gg7p-gv8f-3f34: The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 82022-05-14
GHSA
GHSA-45vm-92vp-645q: The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 82022-05-14
GHSA
GHSA-w4g3-mf84-xf67: The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 82022-05-14
VulnCheck
Microsoft Win32k Memory Corruption Vulnerability2015

📋Vendor Advisories

1
CISA
Microsoft Win32k Memory Corruption Vulnerability2022-03-15

🕵️Threat Intelligence

6
Tenable
ContiLeaks: Chats Reveal Over 30 Vulnerabilities Used by Conti Ransomware – How Tenable Can Help2022-03-24
Securelist
A Modern Hypervisor as a Basis for a Sandbox2017-09-19
Qualys
Patch Tuesday September 2015 | Qualys2015-09-08
Qualys
Patch Tuesday September 2015 | Qualys2015-09-08
Krebs
Microsoft Pushes a Dozen Security Updates2015-09-08

📄Research Papers

1
arXiv
Investigation of Advanced Persistent Threats Network-based Tactics, Techniques and Procedures2025-02-12