CVE-2015-1701

HIGH
2015-04-21 [email protected]
7.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

5
Analysis Generated
Mar 26, 2026 - 11:18 vuln.today
Added to CISA KEV
Oct 22, 2025 - 00:15 cisa
CISA KEV
PoC Detected
Oct 22, 2025 - 00:15 vuln.today
Public exploit code
Patch Released
Oct 22, 2025 - 00:15 nvd
Patch available
CVE Published
Apr 21, 2015 - 10:59 nvd
HIGH 7.8

Description

Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2015, aka "Win32k Elevation of Privilege Vulnerability."

Analysis

Win32k.sys in Windows Server 2003, Vista, and Server 2008 allows local privilege escalation through a kernel-mode vulnerability, exploited in the wild alongside browser zero-days in April 2015 as part of APT attack chains.

Technical Context

The vulnerability in the kernel-mode win32k.sys driver allows an attacker with code execution at user level to escalate to SYSTEM privileges. Win32k vulnerabilities are triggered through the GDI/USER subsystem's handling of window objects and messages.

Affected Products

['Microsoft Windows Server 2003 SP2', 'Microsoft Windows Vista SP2', 'Microsoft Windows Server 2008 SP2']

Remediation

Apply Microsoft security update MS15-051. These Windows versions are end-of-life and should be replaced. Implement modern endpoint protection with behavioral detection.

Priority Score

209
Low Medium High Critical
KEV: +50
EPSS: +90.2
CVSS: +39
POC: +20

Share

CVE-2015-1701 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy