{"metadata": {"count": 1, "page": 1, "per_page": 100}, "data": [{"uuid": "191eec84-745e-49ba-87d9-72ad65d6c565", "vulnerability": {"vulnId": "CVE-2018-8639", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "191eec84-745e-49ba-87d9-72ad65d6c565"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2025-03-03T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2025-03-03T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2025-03-03T00:00:00Z"}, "scope": {"notes": "KEV entry: Microsoft Windows Win32k Improper Resource Shutdown or Release Vulnerability | Affected: Microsoft / Windows | Description: Microsoft Windows Win32k contains an improper resource shutdown or release vulnerability that allows for local, authenticated privilege escalation. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2025-03-24 | Known ransomware campaign use (KEV): Known | Notes (KEV): https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2018-8639 ; https://nvd.nist.gov/vuln/detail/CVE-2018-8639"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-404"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Windows", "due_date": "2025-03-24", "date_added": "2025-03-03", "vendorProject": "Microsoft", "vulnerabilityName": "Microsoft Windows Win32k Improper Resource Shutdown or Release Vulnerability", "knownRansomwareCampaignUse": "Known"}}], "references": [{"id": "CVE-2018-8639", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2018-8639"}]}]}
