# Windows TCP/IP 远程代码执行漏洞
# Windows TCP/IP Remote Code Execution Vulnerability
## 概述
此漏洞存在于Windows操作系统的TCP/IP协议栈中。攻击者可以通过发送特制的网络数据包,远程实现代码执行,从而完全控制受影响的系统。
## 影响版本
- Windows 10
- Windows Server 2019
- Windows Server 2022
- 其他基于Windows的系统可能受到影响
## 细节
攻击者在未授权的情况下,向目标系统发送特制的数据包,可以触发TCP/IP协议栈中的堆溢出错误,从而导致远程代码执行。这种漏洞利用无需用户的交互操作,攻击可以在后台静默执行。
## 影响
成功利用此漏洞,攻击者可获得与本地用户相同的权限。这意味着攻击者能执行以下操作:
- 安装程序
- 查看、更改或删除数据
- 创建拥有完全用户权限的新账户
建议用户尽快安装微软官方发布的安全更新以修补此漏洞。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | mitigation script by disabling ipv6 of all interfaces | https://github.com/diegoalbuquerque/CVE-2024-38063 | POC详情 |
2 | CVE-2024-38063 exploits for sale | https://github.com/proxykingdev/CVE-2024-38063 | POC详情 |
3 | CVE-2024-38063 VB | https://github.com/noradlb1/CVE-2024-38063-VB | POC详情 |
4 | CVE-2024-38063 PoC. CVE-2024-38063 Demo | https://github.com/hanks445/CVE-2024-38063 | POC详情 |
5 | Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability. | https://github.com/Sachinart/CVE-2024-38063-POC | POC详情 |
6 | Poc for cve-2024-38063 | https://github.com/p33d/cve-2024-38063 | POC详情 |
7 | None | https://github.com/dweger-scripts/CVE-2024-38063-Remediation | POC详情 |
8 | A PowerShell script to temporarily mitigate the CVE-2024-38063 vulnerability by disabling IPv6 on Windows systems. This workaround modifies the registry to reduce the risk of exploitation without needing the immediate installation of the official Microsoft KB update. Intended as a temporary fix | https://github.com/almogopp/Disable-IPv6-CVE-2024-38063-Fix | POC详情 |
9 | CVE-2024-38063 research so you don't have to. | https://github.com/Th3Tr1ckst3r/CVE-2024-38063 | POC详情 |
10 | Looks like this exploit is theoretical rather practical | https://github.com/haroonawanofficial/CVE-2024-38063-Research-Tool | POC详情 |
11 | poc for CVE-2024-38063 (RCE in tcpip.sys) | https://github.com/ynwarcs/CVE-2024-38063 | POC详情 |
12 | Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability. | https://github.com/Sachinart/CVE-2024-38063-simulation | POC详情 |
13 | None | https://github.com/patchpoint/CVE-2024-38063 | POC详情 |
14 | Windows TCP/IP IPv6(CVE-2024-38063) | https://github.com/PumpkinBridge/Windows-CVE-2024-38063 | POC详情 |
15 | potential memory corruption vulnerabilities in IPv6 networks. | https://github.com/zenzue/CVE-2024-38063-POC | POC详情 |
16 | Remotely Exploiting The Kernel Via IPv6 | https://github.com/AdminPentester/CVE-2024-38063- | POC详情 |
17 | Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability. | https://github.com/Sachinart/CVE-2024-38063-poc | POC详情 |
18 | CVE-2024-38063 is a critical security vulnerability in the Windows TCP/IP stack that allows for remote code execution (RCE) | https://github.com/ThemeHackers/CVE-2024-38063 | POC详情 |
19 | This is a C language program designed to test the Windows TCP/IP Remote Code Execution Vulnerability (CVE-2024-38063). It sends specially crafted IPv6 packets with embedded shellcode to exploit the vulnerability. | https://github.com/KernelKraze/CVE-2024-38063_PoC | POC详情 |
20 | An educational IPv6 exploitation tool which demonstrates advanced networking techniques being used in the wild with CVE-2024-38063. | https://github.com/Th3Tr1ckst3r/Denyv6 | POC详情 |
21 | None | https://github.com/ps-interactive/cve-2024-38063 | POC详情 |
22 | None | https://github.com/Brownpanda29/Cve-2024-38063 | POC详情 |
23 | quick powershell script to fix cve-2024-38063 | https://github.com/FrancescoDiSalesGithub/quick-fix-cve-2024-38063 | POC详情 |
24 | CVE-2024-38063 - Remotely Exploiting The Kernel Via IPv6 | https://github.com/Faizan-Khanx/CVE-2024-38063 | POC详情 |
25 | Kode Eksploitasi CVE-2024-38063 | https://github.com/ArenaldyP/CVE-2024-38063-Medium | POC详情 |
26 | None | https://github.com/lnx-dvlpr/cve-2024-38063 | POC详情 |
27 | None | https://github.com/becrevex/CVE-2024-38063 | POC详情 |
28 | None | https://github.com/idkwastaken/CVE-2024-38063 | POC详情 |
29 | Vulnerability CVE-2024-38063 | https://github.com/thanawee321/CVE-2024-38063 | POC详情 |
30 | None | https://github.com/AliHj98/cve-2024-38063-Anonyvader | POC详情 |
31 | PoC for Windows' IPv6 CVE-2024-38063 | https://github.com/Dragkob/CVE-2024-38063 | POC详情 |
32 | poc for exploiting cve-2024-38063 | https://github.com/selenagomez25/CVE-2024-38063 | POC详情 |
33 | None | https://github.com/Laukage/Windows-CVE-2024-38063 | POC详情 |
34 | None | https://github.com/jamesbishop785/CVE-2024-38063 | POC详情 |
35 | None | https://github.com/brownpanda29/Cve-2024-38063 | POC详情 |
36 | A Python tool leveraging Shodan and Scapy to identify and exploit Windows systems vulnerable to CVE-2024-38063, enabling targeted Denial of Service attacks | https://github.com/jip-0-0-0-0-0/CVE-2024-38063-scanner | POC详情 |
37 | None | https://github.com/fredagsguf/Windows-CVE-2024-38063 | POC详情 |
38 | AI-Powered CVE-2024-38063 0-Day Discovery Fuzzer | https://github.com/haroonawanofficial/AI-CVE-2024-38063-0-DAY | POC详情 |
39 | None | https://github.com/Skac44/CVE-2024-38063 | POC详情 |
暂无评论