First published: Sat Aug 15 2015(Updated: )
Mount Manager in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 mishandles symlinks, which allows physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka "Mount Manager Elevation of Privilege Vulnerability."
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows | ||
Microsoft Windows 10 | ||
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.0 | ||
Microsoft Windows 8.1 | ||
Microsoft Windows RT | ||
Microsoft Windows RT | ||
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Server 2008 Itanium | =r2-sp1 | |
Microsoft Windows Server 2008 Itanium | =r2-sp1 | |
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows Server 2012 x64 | =r2 | |
Microsoft Windows Vista | =sp2 | |
=sp1 | ||
=sp2 | ||
=r2-sp1 | ||
=r2-sp1 | ||
=r2 | ||
=sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1769 has a critical severity rating due to its potential to allow unauthorized remote code execution.
To fix CVE-2015-1769, ensure that your Windows system is updated with the latest security patches provided by Microsoft.
CVE-2015-1769 affects users of Microsoft Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012, and Windows 10.
CVE-2015-1769 enables physically proximate attackers to execute arbitrary code via malicious USB devices.
The main vulnerability of CVE-2015-1769 involves the mishandling of symlinks in the Windows Mount Manager.