Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2017-11847 : Vulnerability Insights and Analysis

Learn about CVE-2017-11847, a critical Windows kernel vulnerability allowing attackers to execute arbitrary code, install programs, access data, and create new accounts with full user rights.

Windows kernel in various versions such as Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and RT1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016, and Windows Server, version 1709 has a vulnerability known as "Windows Kernel Elevation of Privilege Vulnerability". This vulnerability allows an attacker to execute arbitrary code in kernel mode, install programs, access, modify or delete data, and create new accounts with complete user rights. The vulnerability stems from the improper handling of objects in memory.

Understanding CVE-2017-11847

This CVE identifies a critical vulnerability in the Windows kernel that could lead to privilege escalation attacks.

What is CVE-2017-11847?

The vulnerability allows attackers to run malicious code in kernel mode, compromising system integrity and potentially gaining full control over the affected system.

The Impact of CVE-2017-11847

        Attackers can execute arbitrary code in kernel mode, leading to system compromise.
        Unauthorized installation of programs and access to sensitive data is possible.
        Creation of new accounts with full user rights can occur.

Technical Details of CVE-2017-11847

The technical aspects of the vulnerability are crucial for understanding its implications.

Vulnerability Description

The vulnerability arises from the improper handling of objects in memory within the Windows kernel.

Affected Systems and Versions

        Windows 7 SP1
        Windows Server 2008 SP2 and R2 SP1
        Windows 8.1 and RT1
        Windows Server 2012 and R2
        Windows 10 Gold, 1511, 1607, 1703, and 1709
        Windows Server 2016
        Windows Server, version 1709

Exploitation Mechanism

Attackers exploit this vulnerability by manipulating objects in memory to execute arbitrary code and gain elevated privileges.

Mitigation and Prevention

Protecting systems from CVE-2017-11847 requires immediate actions and long-term security practices.

Immediate Steps to Take

        Apply security patches provided by Microsoft promptly.
        Implement least privilege access controls to limit potential damage.
        Monitor system logs for any suspicious activities.

Long-Term Security Practices

        Regularly update and patch systems to address known vulnerabilities.
        Conduct security training for users to recognize and report potential security threats.
        Employ intrusion detection systems to identify unauthorized access attempts.

Patching and Updates

Regularly check for security updates from Microsoft and apply them to ensure system protection.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now