CVE-2015-1701

HIGH KEV RANSOMWARE

Microsoft Win32k - Privilege Escalation

Title source: llm

Description

Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2015, aka "Win32k Elevation of Privilege Vulnerability."

Exploits (10)

exploitdb WORKING POC VERIFIED
by Metasploit · rubylocalwindows
https://www.exploit-db.com/exploits/37367
exploitdb WORKING POC VERIFIED
by hfiref0x · textlocalwindows
https://www.exploit-db.com/exploits/37049
nomisec WORKING POC 291 stars
by hfiref0x · local
https://github.com/hfiref0x/CVE-2015-1701
github STUB 31 stars
by OpenSISE · cpoc
https://github.com/OpenSISE/CVE_PoC_Collect/tree/master/EoP/windows/CVE-2015-1701
github NO CODE
by DanukaNuwan · poc
https://github.com/DanukaNuwan/CVE-Exploits/tree/main/CVE-2015-1701.pdf
nomisec WRITEUP
by Anonymous-Family · poc
https://github.com/Anonymous-Family/CVE-2015-1701
nomisec STUB
by Anonymous-Family · poc
https://github.com/Anonymous-Family/CVE-2015-1701-download
metasploit WORKING POC NORMAL
by Unknown, hfirefox, OJ Reeves, Spencer McIntyre · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/ms15_051_client_copy_image.rb
patchapalooza WORKING POC
by hfiref0x · poc
https://gitee.com/hfiref0x/CVE-2015-1701
patchapalooza WRITEUP
by Ascotbe · local
https://github.com/Ascotbe/Kernelhub

Scores

CVSS v3 7.8
EPSS 0.9018
EPSS Percentile 99.6%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2022-03-03
VulnCheck KEV 2015-04-18
InTheWild.io 2015-04-18
ENISA EUVD EUVD-2015-1831
Ransomware Use Confirmed
Status published
Products (5)
microsoft/windows_2003_server
microsoft/windows_2003_server r2 sp2
microsoft/windows_7
microsoft/windows_server_2008
microsoft/windows_vista
Published Apr 21, 2015
KEV Added Mar 03, 2022
Tracked Since Feb 18, 2026