Zero-day vulnerability in Windows

Improper validation of array index

The vulnerability was discovered by Sergey Golovanov from Kaspersky Lab. The vulnerability was exploited by Stuxnet.

Known malware:


Vulnerability details

Advisory: SB2010101201 - Multiple privilege escalation vulnerabilities in Win32k.sys in Microsoft Windows

Vulnerable component: Windows

CVE-ID: CVE-2010-2743

CVSSv3 score: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C

CWE-ID: CWE-129 - Improper Validation of Array Index


The vulnerability allows a local user to execute arbitrary code with elevated privileges.

The vulnerability exists due to an error in Win32k.sys driver when handling keyboard layouts as the Windows kernel fails to validate that an array index is within the bounds of the array. A local user can load a specially crafted keyboard layout and execute arbitrary code on the target system with privileges of SYSTEM account.

Successful exploitation of this vulnerability may allow an attacker to escalate privileges on vulnerable system.

Note: this vulnerability is being actively exploited by Stuxnet.

Public Exploits: