Exploring a New Class of Kernel Exploit Primitive

Microsoft Security Header
The security landscape is dynamic, changing often and as a result, attack surfaces evolve. MSRC receives a wide variety of cases spanning different products, bug types and exploit primitives. One particularly interesting primitive we see is an arbitrary kernel pointer read. These often happen when kernel mode code does not validate that pointers read from …

Exploring a New Class of Kernel Exploit Primitive Read More »

Source – Microsoft Security Response Center

All content and images belong to their respected owners, this article is curated for informational purposes only.

Previous Post
Microsoft Security Header

Guidance for CVE-2022-23278 spoofing in Microsoft Defender for Endpoint

Next Post
Microsoft Security Header

Increasing Representation of Women in Security Research

Related Posts