CVE-2023-21768 Local Privilege Escalation POC
2023-3-15 16:0:30 Author: Ots安全(查看原文) 阅读量:65 收藏

authors: chompie & b33f

For demonstration purposes only. Complete exploit works on vulnerable Windows 11 22H2 systems. Write primitive works on all vulnerable systems.

Usage:

Windows_AFD_LPE_CVE-2023-21768.exe <pid>

where <pid> is the process ID (in decimal) of the process to elevate.

Should result in the target process being elevated to SYSTEM

The I/O Ring LPE primitive code is based on the I/ORing R/W PoC by Yarden Shafir

Blog post soon, will update repo when it's released.

项目地址:https://github.com/chompie1337/Windows_LPE_AFD_CVE-2023-21768


文章来源: http://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247496765&idx=3&sn=cab94f221057d5ed75f9ef99dff6ffbc&chksm=9badbd76acda3460d22b2ab6a4ab7d324082705fc153d343b9dbce63b30af503897f77db1feb#rd
如有侵权请联系:admin#unsafe.sh