Kaspersky Lab researchers Boris Larin (Oct0xor) and Igor Soumenkov (2igosha) discovered a zero-day vulnerability in ntoskrnl.exe. Microsoft just released a patch, part of its December update, crediting researchers with the discovery. This is the third consecutive exploited Local Privilege Escalation vulnerability in Windows we discovered this autumn using our technologies. We believe this exploit is used by several threat actors including, but possibly not limited to, FruityArmor and SandCat.”]
Source: https://securelist.com/zero-day-in-windows-kernel-transaction-manager-cve-2018-8611/89253/