CVE-2015-1701
HIGH KEV RANSOMWAREMicrosoft Win32k - Privilege Escalation
Title source: llmDescription
Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2015, aka "Win32k Elevation of Privilege Vulnerability."
Exploits (10)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubylocalwindows
https://www.exploit-db.com/exploits/37367
exploitdb
WORKING POC
VERIFIED
by hfiref0x · textlocalwindows
https://www.exploit-db.com/exploits/37049
github
STUB
31 stars
by OpenSISE · cpoc
https://github.com/OpenSISE/CVE_PoC_Collect/tree/master/EoP/windows/CVE-2015-1701
github
NO CODE
by DanukaNuwan · poc
https://github.com/DanukaNuwan/CVE-Exploits/tree/main/CVE-2015-1701.pdf
metasploit
WORKING POC
NORMAL
by Unknown, hfirefox, OJ Reeves, Spencer McIntyre · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/ms15_051_client_copy_image.rb
Scores
CVSS v3
7.8
EPSS
0.9018
EPSS Percentile
99.6%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CISA KEV
2022-03-03
VulnCheck KEV
2015-04-18
InTheWild.io
2015-04-18
ENISA EUVD
EUVD-2015-1831
Ransomware Use
Confirmed
Status
published
Products (5)
microsoft/windows_2003_server
microsoft/windows_2003_server
r2 sp2
microsoft/windows_7
microsoft/windows_server_2008
microsoft/windows_vista
Published
Apr 21, 2015
KEV Added
Mar 03, 2022
Tracked Since
Feb 18, 2026