{"id":"CVE-2016-7255","details":"The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allow local users to gain privileges via a crafted application, aka \"Win32k Elevation of Privilege Vulnerability.\"","modified":"2026-03-15T22:10:52.440035Z","published":"2016-11-10T07:00:09.460Z","references":[{"type":"WEB","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-7255"},{"type":"WEB","url":"https://securingtomorrow.mcafee.com/mcafee-labs/digging-windows-kernel-privilege-escalation-vulnerability-cve-2016-7255/"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1037251"},{"type":"ADVISORY","url":"https://security.googleblog.com/2016/10/disclosing-vulnerabilities-to-protect.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/94064"},{"type":"FIX","url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-135"},{"type":"ARTICLE","url":"http://blog.trendmicro.com/trendlabs-security-intelligence/one-bit-rule-system-analyzing-cve-2016-7255-exploit-wild/"},{"type":"EVIDENCE","url":"https://www.exploit-db.com/exploits/40745/"},{"type":"EVIDENCE","url":"https://github.com/mwrlabs/CVE-2016-7255"},{"type":"EVIDENCE","url":"https://www.exploit-db.com/exploits/40823/"},{"type":"EVIDENCE","url":"https://www.exploit-db.com/exploits/41015/"},{"type":"EVIDENCE","url":"http://packetstormsecurity.com/files/140468/Microsoft-Windows-Kernel-win32k.sys-NtSetWindowLongPtr-Privilege-Escalation.html"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"r2-sp1"}]},{"events":[{"introduced":"0"},{"last_affected":"r2"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-7255.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}