Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2023-21768
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
非可信指针解引用
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Windows Ancillary Function Driver for WinSock 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft Windows Ancillary Function Driver for WinSock是美国微软(Microsoft)公司的Winsock 的辅助功能驱动程序。 Microsoft Windows Ancillary Function Driver for WinSock存在安全漏洞。攻击者利用该漏洞可以提升权限。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
MicrosoftWindows Server 2022 10.0.20348.0 ~ 10.0.20348.1487 -
MicrosoftWindows 11 version 21H2 10.0.0 ~ 10.0.22000.1455 -
MicrosoftWindows 11 version 22H2 10.0.22621.0 ~ 10.0.22621.1105 -
II. Public POCs for CVE-2023-21768
#POC DescriptionSource LinkShenlong Link
1LPE exploit for CVE-2023-21768https://github.com/chompie1337/Windows_LPE_AFD_CVE-2023-21768POC Details
2cve-2023-21768https://github.com/cl4ym0re/cve-2023-21768-compiledPOC Details
3Using CVE-2023-21768 to manual map kernel mode driver https://github.com/SamuelTulach/nullmapPOC Details
4Windows_AFD_LPE_CVE-2023-21768https://github.com/Malwareman007/CVE-2023-21768POC Details
5Windows 11 System Permission Elevationhttps://github.com/HKxiaoli/Windows_AFD_LPE_CVE-2023-21768POC Details
6CVE-2023-21768 Windows 11 22H2 系统本地提权 POChttps://github.com/CKevens/CVE-2023-21768-POCPOC Details
7Nonehttps://github.com/h1bAna/CVE-2023-21768POC Details
8Nonehttps://github.com/zoemurmure/CVE-2023-21768-AFD-for-WinSock-EoP-exploitPOC Details
9recreating exp for cve-2023-21768.https://github.com/Rosayxy/Recreate-cve-2023-21768POC Details
10CVE-2023-21768 Proof of Concepthttps://github.com/Ha0-Y/CVE-2023-21768POC Details
11C# / .NET version of CVE-2023-21768https://github.com/xboxoneresearch/CVE-2023-21768-dotnetPOC Details
12Using CVE-2023-21768 to manual map kernel mode driver https://github.com/SultanPLX/SamuelTulach_nullmapPOC Details
13CVE-2023-21768 Windows 11 22H2 系统本地提权 POChttps://github.com/3yujw7njai/CVE-2023-21768-POCPOC Details
14CVE-2023-21768 Proof of Concepthttps://github.com/ldrx30/CVE-2023-21768POC Details
15Exploit implementation with IO Rings for CVE-2023-21768https://github.com/IlanDudnik/CVE-2023-21768POC Details
16CVE-2023-21768 Windows 11 22H2 系统本地提权 POChttps://github.com/AiK1d/CVE-2023-21768-POCPOC Details
17Nonehttps://github.com/radoi-teodor/CVE-2023-21768-DSE-BypassPOC Details
18CVE-2023-21768 Windows 11 22H2 系统本地提权 POChttps://github.com/P4x1s/CVE-2023-21768-POCPOC Details
19https://github.com/chompie1337/Windows_LPE_AFD_CVE-2023-21768https://github.com/Feede33/Windows-11-ExploitPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2023-21768
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2023-21768

No comments yet


Leave a comment