#VU977 Privilege escalation in Windows and Windows Server - CVE-2016-7185
Published: October 14, 2016 / Updated: September 14, 2018
Vulnerability identifier: #VU977
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber
CVE-ID: CVE-2016-7185
CWE-ID: CWE-119
Exploitation vector: Local access
Exploit availability:
Public exploit is available
Vulnerable software:
Windows
Windows Server
Windows
Windows Server
Software vendor:
Microsoft
Microsoft
Description
The vulnerability allows a local user to obtain elevated privileges on the target system.
The weakness exists due to boundary error when handling crafted input. By using an application that is designed to submit a malicious input, attacker can obtain root privileges on the affected system that allows him to execute arbitrary code in kernel mode.
Successful exploitation of the vulnerability may result in complete vulnerable system compromise.
The weakness exists due to boundary error when handling crafted input. By using an application that is designed to submit a malicious input, attacker can obtain root privileges on the affected system that allows him to execute arbitrary code in kernel mode.
Successful exploitation of the vulnerability may result in complete vulnerable system compromise.
Remediation
Cybersecurity Help is currently unaware of any official patch addressing the vulnerability.