CVE-2015-1701
ENISA EUVD: EUVD-2015-1831 ↗
Exploited in the Wild
✓ Confirmed 0-Day
★ Google Project Zero
Triaged: March 5, 2026
Published: 2015-04-21
EPSS Score
Source: FIRST.org · 2026-05-23
90.43%
probability
This CVE has a 90.43% probability
of being exploited in the next 30 days.
0%
Top 99.6th percentile of all CVEs
100%
CVSS v3.1
Source: VulnerabilityLookup (CIRCL)7.8
HIGH
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v2 (legacy)
7.2
HIGH
Access Vector
Local
Access Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
AV:L/AC:L/Au:N/C:C/I:C/A:C
Description
VulnerabilityLookup (CNA)Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2015, aka "Win32k Elevation of Privilege Vulnerability."
Affected Products
n/a
n/a
Google Project Zero
Discovered
April 18, 2015
Patched
May 12, 2015
Reported by
???
Root Cause Analysis
???
Exploits & PoC
hfiref0x/CVE-2015-1701
Win32k LPE vulnerability used in APT attack
293
2017-12-18
Anonymous-Family/CVE-2015-1701
Unspecified vulnerability in Microsoft Windows before 8 allows local users to gain privileges via unknown vectors, as exploited in the wild in April 2
0
2022-03-21
0
2022-03-21
gousseine-systems/vuln-rabilit-windows7
ecrit un script python de correction de la vulnérabilités windows 7 pour réponse automatique de wazuh: CVE-2017-0143 (MS17-010 - EternalBlue) CVE-2019
0
2024-03-28
4 repos — triés par ⭐
Rechercher sur GitHub ↗
http://twitter.com/symantec/statuses/590208710527549440
x_refsource_MISC
https://www.exploit-db.com/exploits/37049/
exploit
x_refsource_EXPLOIT-DB
http://www.securityfocus.com/bid/74245
vdb-entry
x_refsource_BID
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-051
vendor-advisory
x_refsource_MS
https://www.exploit-db.com/exploits/37367/
exploit
x_refsource_EXPLOIT-DB
Signal Intelligence
Confidence
95%
EPSS
90.43%
CVSS v3.1
7.8
Mentions
0
CNA Information
CNA Assigner
microsoft
Analyst Note
Auto-imported from Google Project Zero — confirmed zero-day by definition.
Threat Actors 1
Turla Group
apt_group
Information theft and espionage
Russian Federation
Triage Info
Decided atMar 05, 2026
Published DateApr 21, 2015