{"uuid": "34ccb1a5-ff95-4fe6-8581-76b77a568a9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-8611", "type": "exploited", "source": "https://t.me/information_security_channel/22942", "content": "Threat actors exploiting the recently patched Windows Kernel Privilege Escalation Vulnerability (CVE-2018-8611) that allows attackers to run arbitrary code in kernel mode and install program with admin privileges. The vulnerability is due to the improper file execution operations in the kernel mode. Security researchers from Kaspersky uncovered the zero-day vulnerability and it has been reported [\u2026]\nThe post Hackers Actively Exploiting the Recently Patched Windows kernel Zero-day Vulnerability in Wild (https://gbhackers.com/threat-actor-windows-kernel/) appeared first on GBHackers On Security (https://gbhackers.com/).", "creation_timestamp": "2018-12-13T01:55:24.000000Z"}