5.5
CVSSv3

CVE-2016-0070

Published: 14/10/2016 Updated: 12/10/2018
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 435
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold, 1511, and 1607 allows local users to gain privileges via a crafted application that makes an API call to access sensitive information in the registry, aka "Windows Kernel Local Elevation of Privilege Vulnerability."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows server 2012 r2

microsoft windows 8.1

microsoft windows 10 -

microsoft windows server 2008 r2

microsoft windows server 2008

microsoft windows 10 1511

microsoft windows 10 1607

microsoft windows vista

microsoft windows rt 8.1

microsoft windows 7

microsoft windows server 2012 -

Exploits

Source: bugschromiumorg/p/project-zero/issues/detail?id=873 We have encountered Windows kernel crashes in the memmove() function called by nt!CmpCheckValueList while loading corrupted registry hive files An example of a crash log excerpt generated after triggering the bug is shown below: --- ATTEMPTED_WRITE_TO_READONLY_MEMORY (be) An a ...