#VU5669 Security bypass in Windows and Windows Server - CVE-2015-2454
Published: February 8, 2017 / Updated: March 10, 2017
Vulnerability identifier: #VU5669
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2015-2454
CWE-ID: CWE-264
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
Windows
Windows Server
Windows
Windows Server
Software vendor:
Microsoft
Microsoft
Description
The vulnerabiity allows a local attacker to bypass security restrictions on the target system.
The weakness exists due to improper validation and enforcement of impersonation levels by Windows kernel-mode driver. A local attacker can create a specially crafted application, execute it on the system, bypass impersonation-level security and gain elevated privileges.
Successful exploitation of this vulnerability may result in privilege escalation on the vulnerable system.
The weakness exists due to improper validation and enforcement of impersonation levels by Windows kernel-mode driver. A local attacker can create a specially crafted application, execute it on the system, bypass impersonation-level security and gain elevated privileges.
Successful exploitation of this vulnerability may result in privilege escalation on the vulnerable system.
Remediation
Install update from vendor's website.