Think you have a false positive on this rule?

Sid 1-45649

Message

OS-WINDOWS Microsoft Windows win32k.sys privilege escalation attempt

Summary

This event is generated when an attempt to exploit CVE-2018-0742 is detected.

Impact

Attempted User Privilege Gain

CVE-2018-0742:

CVSS base score 7.8

CVSS impact score 5.9

CVSS exploitability score 1.8

Confidentiality Impact HIGH

Integrity Impact HIGH

Availability Impact HIGH

Detailed information

CVE-2018-0742: The Windows kernel in Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to the way objects are handled in memory, aka "Windows Kernel Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0756. CVE-2018-0809, CVE-2018-0820 and CVE-2018-0843.

Affected systems

  • microsoft windows_10 -
  • microsoft windows_10 1511
  • microsoft windows_10 1607
  • microsoft windows_10 1703
  • microsoft windows_10 1709
  • microsoft windows_7 -
  • microsoft windows_8.1 *
  • microsoft windowsrt8.1 *
  • microsoft windowsserver1709 -
  • microsoft windowsserver2008 *
  • microsoft windowsserver2008 r2
  • microsoft windowsserver2012 -
  • microsoft windowsserver2012 r2
  • microsoft windowsserver2016 -

Ease of attack

CVE-2018-0742:

Access Vector

Access Complexity

Authentication

False positives

False negatives

Corrective action

Investigate host for possible compromise. Apply necessary patches and upgrade system as soon as possible.

Contributors

  • Cisco's Talos Intelligence Group

Additional References

  • portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2018-0742