CVE DATABASE / CVE-2015-1769
CVE-2015-1769
Microsoft Windows Mount Manager Privilege Escalation Vulnerability
Confirmed exploited in the wild. Added 2022-05-25.
Federal remediation due 2022-06-15.
Required action: Apply updates per vendor instructions.
Summary
Mount Manager in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 mishandles symlinks, which allows physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka "Mount Manager Elevation of Privilege Vulnerability."
CVSS 3.1 breakdown
| Base score | 6.6 (MEDIUM) |
| Vector | CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
| Attack vector | PHYSICAL |
| Attack complexity | LOW |
| Privileges required | LOW |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | HIGH |
| Integrity | HIGH |
| Availability | HIGH |
Weakness type (CWE)
Affected products
Use our free CVE Lookup tool for the latest NVD record, or browse the full CISA KEV catalog.
References
- http://blogs.technet.com/b/srd/archive/2015/08/11/defending-against-cve-2015-1769-a-logical-issue-exploited-via-a-malicious-usb-stick.aspx
- http://www.securitytracker.com/id/1033244
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-085
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2015-1769
Data: NIST NVD + CISA KEV. NVD last modified 2026-04-22. Always verify against the vendor advisory before acting.