Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2024-26229
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Windows CSC Service Elevation of Privilege Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
Windows CSC Service Elevation of Privilege Vulnerability
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
堆缓冲区溢出
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Windows Kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft Windows Kernel是美国微软(Microsoft)公司的Windows操作系统的内核。 Microsoft Windows Kernel存在安全漏洞。攻击者利用该漏洞可以提升权限。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 Version 1809 for ARM64-based Systems,W
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
MicrosoftWindows 10 Version 1809 10.0.17763.0 ~ 10.0.17763.5696 -
MicrosoftWindows 10 Version 1809 10.0.0 ~ 10.0.17763.5696 -
MicrosoftWindows Server 2019 10.0.17763.0 ~ 10.0.17763.5696 -
MicrosoftWindows Server 2019 (Server Core installation) 10.0.17763.0 ~ 10.0.17763.5696 -
MicrosoftWindows Server 2022 10.0.20348.0 ~ 10.0.20348.2402 -
MicrosoftWindows 11 version 21H2 10.0.0 ~ 10.0.22000.2899 -
MicrosoftWindows 10 Version 21H2 10.0.19043.0 ~ 10.0.19044.4291 -
MicrosoftWindows 11 version 22H2 10.0.22621.0 ~ 10.0.22621.3447 -
MicrosoftWindows 10 Version 22H2 10.0.19045.0 ~ 10.0.19045.4291 -
MicrosoftWindows 11 version 22H3 10.0.22631.0 ~ 10.0.22631.3447 -
MicrosoftWindows 11 Version 23H2 10.0.22631.0 ~ 10.0.22631.3447 -
MicrosoftWindows Server 2022, 23H2 Edition (Server Core installation) 10.0.25398.0 ~ 10.0.25398.830 -
MicrosoftWindows 10 Version 1507 10.0.10240.0 ~ 10.0.10240.20596 -
MicrosoftWindows 10 Version 1607 10.0.14393.0 ~ 10.0.14393.6897 -
MicrosoftWindows Server 2016 10.0.14393.0 ~ 10.0.14393.6897 -
MicrosoftWindows Server 2016 (Server Core installation) 10.0.14393.0 ~ 10.0.14393.6897 -
MicrosoftWindows Server 2008 Service Pack 2 6.0.6003.0 ~ 6.0.6003.22618 -
MicrosoftWindows Server 2008 Service Pack 2 (Server Core installation) 6.0.6003.0 ~ 6.0.6003.22618 -
MicrosoftWindows Server 2008 Service Pack 2 6.0.6003.0 ~ 6.0.6003.22618 -
MicrosoftWindows Server 2008 R2 Service Pack 1 6.1.7601.0 ~ 6.1.7601.27067 -
MicrosoftWindows Server 2008 R2 Service Pack 1 (Server Core installation) 6.1.7601.0 ~ 6.1.7601.27067 -
MicrosoftWindows Server 2012 6.2.9200.0 ~ 6.2.9200.24821 -
MicrosoftWindows Server 2012 (Server Core installation) 6.2.9200.0 ~ 6.2.9200.24821 -
MicrosoftWindows Server 2012 R2 6.3.9600.0 ~ 6.3.9600.21924 -
MicrosoftWindows Server 2012 R2 (Server Core installation) 6.3.9600.0 ~ 6.3.9600.21924 -
II. Public POCs for CVE-2024-26229
#POC DescriptionSource LinkShenlong Link
1CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I/O Control Codehttps://github.com/varwara/CVE-2024-26229POC Details
2Windows LPEhttps://github.com/RalfHacker/CVE-2024-26229-exploitPOC Details
3BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatelhttps://github.com/NVISOsecurity/CVE-2024-26229-BOFPOC Details
4Windows CSC服务特权提升漏洞。 当程序向缓冲区写入的数据超出其处理能力时,就会发生基于堆的缓冲区溢出,从而导致多余的数据溢出到相邻的内存区域。这种溢出会损坏内存,并可能使攻击者能够执行任意代码或未经授权访问系统。本质上,攻击者可以编写触发溢出的恶意代码或输入,从而控制受影响的系统、执行任意命令、安装恶意软件或访问敏感数据。 微软已发出警告成功利用此漏洞的攻击者可以获得 SYSTEM 权限,这是 Windows 系统上的最高访问级别。这增加了与 CVE-2024-26229 相关的风险,使其成为恶意行为者的主要目标。https://github.com/team-MineDEV/CVE-2024-26229POC Details
5BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatelhttps://github.com/apkc/CVE-2024-26229-BOFPOC Details
6A PoC malware exploiting CVE-2024-26229https://github.com/0XJ175/DRivePOC Details
7A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a privileged userhttps://github.com/Cracked5pider/eop24-26229POC Details
8Nonehttps://github.com/mqxmm/CVE-2024-26229POC Details
9Nim touch up of CVE 2024 26229https://github.com/shinspace92/cve-2024-26229POC Details
10CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I/O Control Codehttps://github.com/dkstar11q/CVE-2024-26229-lpePOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2024-26229
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2024-26229

No comments yet


Leave a comment