First published: Thu Jun 15 2017(Updated: )
Microsoft Windows 8.1 and Windows RT 8.1, Windows Server 2012 R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow an attacker to run processes in an elevated context when the Windows kernel improperly handles objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This CVE ID is unique from CVE-2017-8465.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Windows 10 | ||
Windows 10 | =1511 | |
Windows 10 | =1607 | |
Windows 10 | =1703 | |
Microsoft Windows | ||
Microsoft Windows | =rt | |
Microsoft Windows Server | =r2 | |
Microsoft Windows Server 2016 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-8468 has a severity rating of important, which indicates a significant risk to affected systems.
To mitigate CVE-2017-8468, users should apply the latest security updates provided by Microsoft for their installed Windows version.
CVE-2017-8468 affects Microsoft Windows 8.1, Windows RT 8.1, various versions of Windows 10, and Windows Server 2012 R2 and 2016.
CVE-2017-8468 is categorized as an elevation of privilege vulnerability in the Windows kernel.
CVE-2017-8468 could potentially allow attackers to execute arbitrary code with elevated privileges, but it requires local access to exploit.