Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-21338 PoC — Microsoft Windows Kernel 安全漏洞

Source
Associated Vulnerability
Title:Microsoft Windows Kernel 安全漏洞 (CVE-2024-21338)
Description:Microsoft Windows Kernel是美国微软(Microsoft)公司的Windows操作系统的内核。 Microsoft Windows Kernel存在安全漏洞。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 Version 1809 for ARM64-based Systems,Windows Server 2
Description
Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.
Readme
# CVE-2024-21338
Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.

## Compiling
- Use Microsoft Visual Studio with the C++ package to successfully compile the PoC on both `Release` and `Debug` modes.

## Post
Original blog post: https://hakaisecurity.io/cve-2024-21338-from-admin-to-kernel-through-token-manipulation-and-windows-kernel-exploitation/research-blog/
File Snapshot

[4.0K] /data/pocs/91f8718636acf17a12a19fb465dc7aa688723dd5 ├── [2.8K] console.hpp ├── [1.0K] CVE-2024-21338-POC.sln ├── [4.9K] CVE-2024-21338-POC.vcxproj ├── [ 543] CVE-2024-21338-POC.vcxproj.filters ├── [ 10K] impersonate.cpp ├── [ 865] impersonate.hpp ├── [ 34K] LICENSE ├── [ 620] main.cpp ├── [ 18] pch.cpp ├── [ 183] pch.hpp ├── [1.3M] phnt.h ├── [ 12K] poc.cpp ├── [2.1K] poc.hpp └── [ 443] README.md 0 directories, 14 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.