authors: chompie & b33f
For demonstration purposes only. Complete exploit works on vulnerable Windows 11 22H2 systems. Write primitive works on all vulnerable systems.
Usage:
Windows_AFD_LPE_CVE-2023-21768.exe <pid>
where <pid>
is the process ID (in decimal) of the process to elevate.
Should result in the target process being elevated to SYSTEM
The I/O Ring LPE primitive code is based on the I/ORing R/W PoC by Yarden Shafir
Blog post soon, will update repo when it's released.
项目地址:https://github.com/chompie1337/Windows_LPE_AFD_CVE-2023-21768
原文始发于微信公众号(Ots安全):CVE-2023-21768 Local Privilege Escalation POC
特别标注:
本站(CN-SEC.COM)所有文章仅供技术研究,若将其信息做其他用途,由用户承担全部法律及连带责任,本站不承担任何法律及连带责任,请遵守中华人民共和国安全法.
- 我的微信
- 微信扫一扫
-
- 我的微信公众号
- 微信扫一扫
-
评论