目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2025-33073 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
Windows SMB Client Elevation of Privilege Vulnerability
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
Improper access control in Windows SMB allows an authorized attacker to elevate privileges over a network.
来源: 美国国家漏洞数据库 NVD
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
访问控制不恰当
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Microsoft Windows SMB Server 访问控制错误漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Microsoft Windows SMB Server是美国微软(Microsoft)公司的一个网络文件共享协议。它允许计算机上的应用程序读取和写入文件以及从计算机网络中的服务器程序请求服务。 Microsoft Windows SMB Server存在访问控制错误漏洞。攻击者利用该漏洞可以提升权限。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 11 Version 22H2 for x64-based Systems,Wi
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
MicrosoftWindows 10 Version 1507 10.0.10240.0 ~ 10.0.10240.21034 -
MicrosoftWindows 10 Version 1607 10.0.14393.0 ~ 10.0.14393.8148 -
MicrosoftWindows 10 Version 1809 10.0.17763.0 ~ 10.0.17763.7434 -
MicrosoftWindows 10 Version 21H2 10.0.19044.0 ~ 10.0.19044.5965 -
MicrosoftWindows 10 Version 22H2 10.0.19045.0 ~ 10.0.19045.5965 -
MicrosoftWindows 11 version 22H2 10.0.22621.0 ~ 10.0.22621.5472 -
MicrosoftWindows 11 version 22H3 10.0.22631.0 ~ 10.0.22631.5472 -
MicrosoftWindows 11 Version 23H2 10.0.22631.0 ~ 10.0.22631.5472 -
MicrosoftWindows 11 Version 24H2 10.0.26100.0 ~ 10.0.26100.4349 -
MicrosoftWindows Server 2008 R2 Service Pack 1 6.1.7601.0 ~ 6.1.7601.27769 -
MicrosoftWindows Server 2008 R2 Service Pack 1 (Server Core installation) 6.1.7601.0 ~ 6.1.7601.27769 -
MicrosoftWindows Server 2008 Service Pack 2 6.0.6003.0 ~ 6.0.6003.23351 -
MicrosoftWindows Server 2008 Service Pack 2 (Server Core installation) 6.0.6003.0 ~ 6.0.6003.23351 -
MicrosoftWindows Server 2012 6.2.9200.0 ~ 6.2.9200.25522 -
MicrosoftWindows Server 2012 (Server Core installation) 6.2.9200.0 ~ 6.2.9200.25522 -
MicrosoftWindows Server 2012 R2 6.3.9600.0 ~ 6.3.9600.22620 -
MicrosoftWindows Server 2012 R2 (Server Core installation) 6.3.9600.0 ~ 6.3.9600.22620 -
MicrosoftWindows Server 2016 10.0.14393.0 ~ 10.0.14393.8148 -
MicrosoftWindows Server 2016 (Server Core installation) 10.0.14393.0 ~ 10.0.14393.8148 -
MicrosoftWindows Server 2019 10.0.17763.0 ~ 10.0.17763.7434 -
MicrosoftWindows Server 2019 (Server Core installation) 10.0.17763.0 ~ 10.0.17763.7434 -
MicrosoftWindows Server 2022 10.0.20348.0 ~ 10.0.20348.3807 -
MicrosoftWindows Server 2022, 23H2 Edition (Server Core installation) 10.0.25398.0 ~ 10.0.25398.1665 -
MicrosoftWindows Server 2025 10.0.26100.0 ~ 10.0.26100.4349 -
MicrosoftWindows Server 2025 (Server Core installation) 10.0.26100.0 ~ 10.0.26100.4349 -
二、漏洞 CVE-2025-33073 的公开POC
#POC 描述源链接神龙链接
1PoC Exploit for the NTLM reflection SMB flaw.https://github.com/mverschu/CVE-2025-33073POC详情
2Nonehttps://github.com/obscura-cert/CVE-2025-33073POC详情
3Nonehttps://github.com/matejsmycka/CVE-2025-33073-checkerPOC详情
4Nonehttps://github.com/cve-2025-33073/cve-2025-33073POC详情
5🛠️ Exploit the NTLM reflection SMB flaw with this PoC tool for Kali Linux, enhancing your understanding of CVE-2025-33073 through practical application.https://github.com/sleepasleepzzz/CVE-2025-33073POC详情
6Proof-of-Concepthttps://github.com/SellMeFish/windows-smb-vulnerability-framework-cve-2025-33073POC详情
7Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled.https://github.com/uziii2208/CVE-2025-33073POC详情
8CVE-2025-33073https://github.com/B1ack4sh/Blackash-CVE-2025-33073POC详情
9Proof-of-Concepthttps://github.com/SFRDevelopment/windows-smb-vulnerability-framework-cve-2025-33073POC详情
10CVE-2025-33073https://github.com/Ashwesker/Blackash-CVE-2025-33073POC详情
11🔧 Exploit CVE-2025-33073 with this universal tool for Windows Domain Controllers, enabling SYSTEM-level code execution through automated techniques.https://github.com/Iddygodwin/CVE-2025-33073POC详情
12CVE-2025-33073https://github.com/Ashwesker/Ashwesker-CVE-2025-33073POC详情
13CVE-2025-33073https://github.com/irjfifndn-prog/Blackash-CVE-2025-33073POC详情
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2025-33073 的情报信息
Please 登录 to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2025-33073
匿名用户
2026-01-15 06:08:50

Zaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.


发表评论