Microsoft Windows Win32k Window Switching Code Execution

Strike ID:
E20-0rtu1
CVSS:
7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
False Positive:
f
Variants:
1
Year:
2019

Description

This strike exploits a vulnerability in the Windows win32k kernel driver caused by improper initialized objects in memory. A remote attacker could successfully exploit the vulnerability to execute arbitrary code or cause a denial of service by enticing a user to execute a PE binary file. Note: this exploit was used in 'WizardOpium' malware operation to gain higher privileges on the infected machines.

CVE

References