Deploy autonomous AI agents that reason, exploit, and validate complex vulnerability chains — not another scanner, an agentic system that thinks like a senior pentester.
CVE-2016-7255 is a high severity vulnerability with a CVSS score of 7.8. Exploits are available; patches have been released and should be applied urgently. This is classified as a zero-day vulnerability.
Very high probability of exploitation in the next 30 days
EPSS predicts the probability of exploitation in the next 30 days based on real-world threat data, complementing CVSS severity scores with actual risk assessment.
The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."
| Vendor | Product |
|---|---|
| Microsoft | Windows 7 |
| Microsoft | Windows Server 2012 |
| Microsoft | Windows Rt 8.1 |
| Microsoft | Windows Server 2008 |
| Microsoft | Windows 8.1 |
| Microsoft | Windows Server 2016 |
| Microsoft | Windows Vista |
| Microsoft | Windows 10 1607 |
| Microsoft | Windows 10 1511 |
| Microsoft | Windows 10 1507 |
Please cite this page when referencing data from Strobes VI. Proper attribution helps support our vulnerability intelligence research.