CVE-2023-21768 Local Privilege Escalation POC

admin 2023年3月15日18:30:24评论78 views字数 539阅读1分47秒阅读模式

authors: chompie & b33f

For demonstration purposes only. Complete exploit works on vulnerable Windows 11 22H2 systems. Write primitive works on all vulnerable systems.

Usage:

Windows_AFD_LPE_CVE-2023-21768.exe <pid>

where <pid> is the process ID (in decimal) of the process to elevate.

Should result in the target process being elevated to SYSTEM

The I/O Ring LPE primitive code is based on the I/ORing R/W PoC by Yarden Shafir

Blog post soon, will update repo when it's released.

CVE-2023-21768 Local Privilege Escalation POC

项目地址:https://github.com/chompie1337/Windows_LPE_AFD_CVE-2023-21768

原文始发于微信公众号(Ots安全):CVE-2023-21768 Local Privilege Escalation POC

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2023年3月15日18:30:24
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   CVE-2023-21768 Local Privilege Escalation POChttps://cn-sec.com/archives/1606690.html

发表评论

匿名网友 填写信息