Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2016-3373Microsoft Windows 10 vulnerability

CWE-2645 documents5 sources
Severity
5.5MEDIUMNVD
EPSS
9.5%
top 7.17%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedSep 14
Latest updateMay 14

Description

The kernel API in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold, 1511, and 1607 does not properly implement registry access control, which allows local users to obtain sensitive account information via a crafted application, aka "Windows Kernel Elevation of Privilege Vulnerability."

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages14 packages

🔴Vulnerability Details

1
GHSA
GHSA-qpwq-r9gx-jv69: The kernel API in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 82022-05-14

💥Exploits & PoCs

1
Exploit-DB
Microsoft Windows - RegLoadAppKey Hive Enumeration Privilege Escalation (MS16-111)2016-09-26

📋Vendor Advisories

1
Microsoft
Windows Kernel Local Elevation of Privilege Vulnerability2016-09-13

🕵️Threat Intelligence

1
Zscaler
Zscaler found Multiple Security Vulnerabilities | 09-13-2016