INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global data_breach Government CRITICAL 5h Global ransomware Financial Services / Cybersecurity CRITICAL 5h Global vulnerability Information Technology / Cybersecurity CRITICAL 7h Global malware Energy and Utilities CRITICAL 8h Global ransomware Multiple sectors CRITICAL 8h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 11h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 11h Global phishing Multiple sectors HIGH 12h Global insider Cybersecurity Services CRITICAL 12h Global ransomware Multiple sectors (U.S. companies) CRITICAL 12h Global data_breach Government CRITICAL 5h Global ransomware Financial Services / Cybersecurity CRITICAL 5h Global vulnerability Information Technology / Cybersecurity CRITICAL 7h Global malware Energy and Utilities CRITICAL 8h Global ransomware Multiple sectors CRITICAL 8h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 11h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 11h Global phishing Multiple sectors HIGH 12h Global insider Cybersecurity Services CRITICAL 12h Global ransomware Multiple sectors (U.S. companies) CRITICAL 12h Global data_breach Government CRITICAL 5h Global ransomware Financial Services / Cybersecurity CRITICAL 5h Global vulnerability Information Technology / Cybersecurity CRITICAL 7h Global malware Energy and Utilities CRITICAL 8h Global ransomware Multiple sectors CRITICAL 8h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 11h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 11h Global phishing Multiple sectors HIGH 12h Global insider Cybersecurity Services CRITICAL 12h Global ransomware Multiple sectors (U.S. companies) CRITICAL 12h
Vulnerabilities

CVE-2015-2387

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Microsoft ATM Font Driver Privilege Escalation Vulnerability — ATMFD.DLL in the Adobe Type Manager Font Driver in Microsoft Windows Server allows local users to gain privileges via a crafted applicati
Published: Mar 3, 2022  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Microsoft ATM Font Driver Privilege Escalation Vulnerability — ATMFD.DLL in the Adobe Type Manager Font Driver in Microsoft Windows Server allows local users to gain privileges via a crafted application.

🤖 AI Executive Summary

CVE-2015-2387 is a critical privilege escalation vulnerability in Microsoft's ATM Font Driver (ATMFD.DLL) affecting Windows Server systems. Local attackers can exploit this via crafted applications to gain SYSTEM-level privileges. With a CVSS score of 9.0 and publicly available exploits, this poses an immediate threat to Saudi organizations running Windows Server infrastructure.

📄 Description (Arabic)

ثغرة تصعيد امتيازات حرجة في Microsoft ATM Font Driver (ATMFD.DLL) في برنامج تشغيل خطوط Adobe Type Manager في Microsoft Windows Server. تسمح هذه الثغرة للمستخدمين المحليين بالحصول على امتيازات إدارية من خلال تنفيذ تطبيق معيب أو خاص بهم، مما قد يؤدي إلى السيطرة الكاملة على النظام

🤖 ملخص تنفيذي (AI)

ثغرة حرجة في ATMFD.DLL في برنامج تشغيل خطوط Adobe Type Manager في Microsoft Windows Server تسمح للمستخدمين المحليين بتصعيد الامتيازات من خلال تطبيق معيب

🤖 AI Intelligence Analysis Analyzed: Mar 29, 2026 19:54
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability critically impacts Saudi government agencies (NCA, CITC), banking sector (SAMA-regulated institutions, major banks), healthcare facilities, and energy sector (ARAMCO, utilities). Windows Server is widely deployed across Saudi enterprise infrastructure for domain controllers, file servers, and critical applications. Privilege escalation could lead to complete system compromise, lateral movement across networks, and unauthorized access to sensitive data including financial records and national security information.
🏢 Affected Saudi Sectors
Government (NCA, CITC, Ministry of Interior) Banking and Financial Services (SAMA-regulated) Healthcare (MOH facilities) Energy (ARAMCO, utilities) Telecommunications (STC, Mobily) Education Defense and Security
⚖️ Saudi Risk Score (AI)
9.2
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Identify all Windows Server systems running ATMFD.DLL (typically all Windows Server 2008 R2, 2012, 2012 R2, 2016 installations)
2. Restrict local user access to affected systems; disable unnecessary local accounts
3. Implement application whitelisting to prevent execution of untrusted applications
4. Monitor for suspicious font file processing and ATMFD.DLL activity

PATCHING:
1. Apply Microsoft Security Bulletin MS15-044 immediately
2. Prioritize patching for domain controllers, file servers, and systems with elevated privileges
3. Test patches in non-production environment before deployment
4. Schedule emergency patching windows for critical systems

COMPENSATING CONTROLS (if patching delayed):
1. Implement strict access controls limiting local logon capabilities
2. Disable font installation for non-administrative users via Group Policy
3. Monitor and log all font-related operations
4. Isolate affected systems from untrusted networks

DETECTION:
1. Monitor for ATMFD.DLL loading from unusual processes
2. Alert on font file creation/modification in system directories
3. Track privilege escalation attempts and SYSTEM-level process creation from low-privilege accounts
4. Review Windows Event Viewer for Security events (4688 - Process Creation)
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع أنظمة Windows Server التي تشغل ATMFD.DLL (عادة جميع تثبيتات Windows Server 2008 R2 و 2012 و 2012 R2 و 2016)
2. تقييد وصول المستخدمين المحليين للأنظمة المتأثرة؛ تعطيل الحسابات المحلية غير الضرورية
3. تطبيق قائمة بيضاء للتطبيقات لمنع تنفيذ التطبيقات غير الموثوقة
4. مراقبة معالجة ملفات الخطوط المريبة ونشاط ATMFD.DLL

التصحيح:
1. تطبيق Microsoft Security Bulletin MS15-044 فوراً
2. إعطاء الأولوية لتصحيح متحكمات المجال وخوادم الملفات والأنظمة ذات الامتيازات المرتفعة
3. اختبار التصحيحات في بيئة غير الإنتاج قبل النشر
4. جدولة نوافذ تصحيح طارئة للأنظمة الحرجة

الضوابط البديلة (إذا تأخر التصحيح):
1. تطبيق ضوابط وصول صارمة تقيد قدرات تسجيل الدخول المحلي
2. تعطيل تثبيت الخطوط للمستخدمين غير الإداريين عبر Group Policy
3. مراقبة وتسجيل جميع العمليات المتعلقة بالخطوط
4. عزل الأنظمة المتأثرة عن الشبكات غير الموثوقة

الكشف:
1. مراقبة تحميل ATMFD.DLL من عمليات غير عادية
2. تنبيهات على إنشاء/تعديل ملفات الخطوط في مجلدات النظام
3. تتبع محاولات تصعيد الامتيازات وإنشاء عمليات SYSTEM من حسابات منخفضة الامتيازات
4. مراجعة Windows Event Viewer لأحداث الأمان (4688 - إنشاء العملية)
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
A.5.1.1 - Information Security Policies and Procedures A.6.1.1 - Internal Organization A.8.1.1 - User Access Management A.12.2.1 - Change Management A.12.6.1 - Management of Technical Vulnerabilities
🔵 SAMA CSF
ID.RA-1 - Asset Management and Vulnerability Management PR.IP-12 - Patch Management PR.AC-1 - Access Control and Identity Management DE.CM-8 - Vulnerability Scans
🟡 ISO 27001:2022
A.12.6.1 - Management of technical vulnerabilities A.14.2.1 - Secure development policy A.12.2.1 - Change management procedures A.5.2.1 - Information security responsibilities
🟣 PCI DSS v4.0
6.2 - Ensure security patches are installed 11.2 - Run automated vulnerability scans 2.2 - Configuration standards for system components
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Microsoft:ATM Font Driver
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS31.21%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-03-24
Published 2022-03-03
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.2
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.