VYPR
Unrated severityNVD Advisory· Published Jan 20, 2011· Updated Apr 29, 2026

CVE-2010-2743

CVE-2010-2743

Description

The kernel-mode drivers in Microsoft Windows XP SP3 do not properly perform indexing of a function-pointer table during the loading of keyboard layouts from disk, which allows local users to gain privileges via a crafted application, as demonstrated in the wild in July 2010 by the Stuxnet worm, aka "Win32k Keyboard Layout Vulnerability." NOTE: this might be a duplicate of CVE-2010-3888 or CVE-2010-3889.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Microsoft Windows XP SP3 kernel-mode drivers improperly index a function-pointer table when loading keyboard layouts, allowing local privilege escalation; exploited by Stuxnet.

Vulnerability

CVE-2010-2743 is an elevation of privilege vulnerability in the kernel-mode drivers (win32k.sys) of Microsoft Windows XP Service Pack 3. The vulnerability occurs because the Windows kernel-mode drivers do not properly perform indexing of a function-pointer table during the loading of keyboard layouts from disk [1]. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability; it cannot be exploited remotely or by anonymous users [1].

Exploitation

To exploit this vulnerability, a local attacker first logs on to an affected system and then runs a specially crafted application. The crafted application triggers the kernel-mode driver to incorrectly index the function-pointer table when loading a keyboard layout from disk [1]. This vulnerability was exploited in the wild in July 2010 by the Stuxnet worm [Description].

Impact

Successful exploitation allows an attacker to gain elevated privileges on the affected system [1]. The attacker could then run arbitrary code in kernel mode, install programs, view, change, or delete data, or create new accounts with full user rights [1].

Mitigation

Microsoft released security bulletin MS10-073 in October 2010 to address this vulnerability [1]. The update corrects the manner in which the Windows kernel-mode drivers index a table of function pointers when loading a keyboard layout from disk [1]. Customers with automatic updating enabled are automatically protected; others should install the update manually [1]. There is no known workaround or mitigation other than applying the security update.

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

19
  • cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*+ 2 more
    • cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*+ 7 more
    • cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*+ 2 more
    • cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*+ 1 more
    • cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*
    • cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.