⚠ Actively exploited
Added to CISA KEV on 2022-02-10. Federal agencies required to patch by 2022-08-10. Required action: Apply updates per vendor instructions..

CVE-2017-0263Use After Free in Corporation Microsoft Windows

Severity
7.8HIGHNVD
EPSS
18.5%
top 4.75%
CISA KEV
KEV
Added 2022-02-10
Due 2022-08-10
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedMay 12
KEV addedFeb 10
Latest updateJun 21
KEV dueAug 10
CISA Required Action: Apply updates per vendor instructions.

Description

The kernel-mode drivers in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Patches

🔴Vulnerability Details

3
GHSA
GHSA-4fm9-9m4x-vrqw: A kernel-mode driver in Microsoft Windows XP SP3, Windows XP x64 XP2, Windows Server 2003 SP2, Windows Vista, Windows 7 SP1, Windows Server 2008 SP2 a2022-05-13
GHSA
GHSA-c264-rp8f-rf64: The kernel-mode drivers in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 82022-05-13
VulnCheck
Microsoft Win32k Privilege Escalation Vulnerability2017

💥Exploits & PoCs

1
Exploit-DB
Microsoft Windows Manager (7 x86) - Menu Management Component UAF Privilege Elevation2018-03-26

📋Vendor Advisories

2
CISA
Microsoft Win32k Privilege Escalation Vulnerability2022-02-10
Microsoft
Win32k Elevation of Privilege Vulnerability2017-05-09

🕵️Threat Intelligence

11
Qualys
Managing CISA Known Exploited Vulnerabilities with Qualys VMDR | Qualys2022-02-23
Tenable
Daisy Chaining: How Vulnerabilities Can Be Greater Than the Sum of Their Parts2021-01-21
Securelist
Zero-day exploit (CVE-2018-8453) used in targeted attacks | Securelist2018-10-10
Securelist
Zero-day exploit (CVE-2018-8453) used in targeted attacks2018-10-10
Securelist
A Slice of 2017 Sofacy Activity2018-02-20

📄Research Papers

1
arXiv
Identification of Attack Paths Using Kill Chain and Attack Graphs2022-06-21
CVE-2017-0263 — Use After Free | cvebase