Zero-day vulnerability in Windows

Privilege escalation

Used to  compromise organizations in the USA and Canada. First attacks were detected in 08.03.2016.

Known malware:


Vulnerability details

Advisory: SB2016041203 - Multiple vulnerabilities in Microsoft Windows

Vulnerable component: Windows

CVE-ID: CVE-2016-0167

CVSSv3 score: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:H/RL:O/RC:C

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls


The vulnerability allows a local attacker to gain elevated privileges on the target system.

The vulnerability exists due to improper handling of objects in memory by the kernel-mode driver. A local attacker can run a specially crafted program, gain elevated privileges and execute arbitrary code with SYSTEM privileges.

Successful exploitation of this vulnerability may result in arbitrary code execution on the vulnerable system.

Note: the vulnerability was being actively exploited.

Known APT campaigns:

PUNCHTRACK - companies in USA and Canada

According to FireEye hackers used malware тАЬPUNCHTRACKтАЭ to steal usersтАЩ credit card data.