Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2016-0006Microsoft Windows 10 vulnerability

CWE-26411 documents7 sources
Severity
7.8HIGHNVD
NVD7.3
EPSS
5.2%
top 10.02%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJan 13
Latest updateMay 14

Description

The sandbox implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandles reparse points, which allows local users to gain privileges via a crafted application, aka "Windows Mount Point Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-0007.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:HExploitability: 1.3 | Impact: 5.9

Affected Packages13 packages

Patches

🔴Vulnerability Details

2
GHSA
GHSA-8mjx-vmhp-8fv4: The sandbox implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 82022-05-14
GHSA
GHSA-2g93-xqpg-j265: The sandbox implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 82022-05-14

💥Exploits & PoCs

2
Exploit-DB
SAP SAPCAR - Multiple Vulnerabilities2016-08-10
Exploit-DB
Microsoft Windows - Sandboxed Mount Reparse Point Creation Mitigation Bypass Redux (MS16-008) (1)2016-01-25

📋Vendor Advisories

2
VMware
VMware vCenter Server updates address an important cross-site scripting issue2016-05-24
Microsoft
CVE-2016-0006: Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Rel2016-01-12

🕵️Threat Intelligence

2
Talos
Microsoft Patch Tuesday - January 20162016-01-12
Talos
Microsoft Patch Tuesday - January 20162016-01-12

💬Community

1
Bugzilla
CVE-2016-4761 webkitgtk: use-after-free leads to DoS2020-02-06