# CVE-2023-36874
For demonstration purposes only. Exploit works on vulnerable Windows clients/servers.
Compile code and create c:\test\system32 directories. Place your wermgr.exe in that directory and run compiled PoC.
https://github.com/Wh04m1001/CVE-2023-36874/assets/44291883/417d1384-4f3f-42c0-9e07-80d4347ed9c7
Testing on windows 10 19045.2006
https://github.com/Wh04m1001/CVE-2023-36874/assets/44291883/483c37bc-874f-4a5c-80fd-b962057d7215
Resources:
https://www.crowdstrike.com/blog/falcon-complete-zero-day-exploit-cve-2023-36874/
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36874
[4.0K] /data/pocs/3b652bc9839e9bd6d74265cca5444592b0d6a2fd
├── [4.8K] def.h
├── [4.9K] main.cpp
├── [ 623] README.md
├── [6.2K] Report.wer
├── [ 451] resource.h
├── [2.9K] Resource.rc
└── [4.0K] wermgr
└── [ 619] main.cpp
1 directory, 7 files