First published: Wed Oct 14 2015(Updated: )
The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 mishandles junctions during mountpoint creation, which makes it easier for local users to gain privileges by leveraging certain sandbox access, aka "Windows Mount Point Elevation of Privilege Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Windows 10 | ||
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.0 | ||
Microsoft Windows | ||
Microsoft Windows RT | ||
Microsoft Windows RT | ||
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =r2 | |
Microsoft Windows Vista | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2553 has a critical severity rating, which allows local users to gain elevated privileges.
To mitigate CVE-2015-2553, it is recommended to apply the latest security updates provided by Microsoft for the affected Windows versions.
CVE-2015-2553 affects multiple versions of Windows including Vista SP2, Windows 7 SP1, Windows 8, Windows 8.1, Windows 10, and various versions of Windows Server.
CVE-2015-2553 is primarily a local privilege escalation vulnerability, requiring local access to exploit it.
CVE-2015-2553 allows attackers to create junctions during mountpoint creation, facilitating unauthorized privilege escalation.