⚠ Actively exploited
Added to CISA KEV on 2022-02-10. Federal agencies required to patch by 2022-08-10. Required action: Apply updates per vendor instructions..
CVE-2017-0263 — Use After Free in Corporation Microsoft Windows
Severity
7.8HIGHNVD
EPSS
18.5%
top 4.75%
CISA KEV
KEV
Added 2022-02-10
Due 2022-08-10
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedMay 12
KEV addedFeb 10
Latest updateJun 21
KEV dueAug 10
CISA Required Action: Apply updates per vendor instructions.
Description
The kernel-mode drivers in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages14 packages
Patches
🔴Vulnerability Details
3GHSA▶
GHSA-4fm9-9m4x-vrqw: A kernel-mode driver in Microsoft Windows XP SP3, Windows XP x64 XP2, Windows Server 2003 SP2, Windows Vista, Windows 7 SP1, Windows Server 2008 SP2 a↗2022-05-13
GHSA▶
GHSA-c264-rp8f-rf64: The kernel-mode drivers in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8↗2022-05-13
💥Exploits & PoCs
1Exploit-DB
▶