Exploit and report for CVE-2022-43293# Exploits for CVE-2022-43293
<p align="center">
<img src="POC_AFW.gif" title="Arbitrary File Write\Overwrite POC">
</p>
<hr>
<p align="center">
<img src="POC_WDOS.gif" title="Windows Denial of Service POC">
</p>
To get a persistent Windows Denial of Service (as shown in the POC above), simply run <code>Exploit.bat</code> and enter <code>%windir%\system32\cng.sys</code> when you're asked which file you want to overwrite.
<hr>
<a href="https://lucabarile.github.io/Blog/CVE-2022-43293/index.html" target="_blank" rel="noopener noreferrer">Here</a> you can find my <b>Arbitrary File Write\Overwrite Vulnerability</b> report.<br>
<a href="https://lucabarile.github.io/Blog/CVE-2022-43293/index.html#par9" target="_blank" rel="noopener noreferrer">Here</a> you can understand how to use an <b>Arbitrary File Write\Overwrite</b> primitive <b>to</b> achieve a <b>Windows Denial of Service</b>.<br>
<a href="https://www.buymeacoffee.com/LucaBarile" target="_blank" rel="noopener noreferrer">Here</a> you can buy me a unicorn 🦄
<hr>
<h5 align="right">Share the Knowledge!</h5>
[4.0K] /data/pocs/945d6518c8fa0395b86e12cd1d8ffe1416e8b076
├── [4.0K] Exploit
│ ├── [115K] CreateMountPoint.exe
│ ├── [128K] CreateSymlink.exe
│ └── [ 610] Exploit.bat
├── [4.0K] Files
│ ├── [4.0K] Plugging
│ │ ├── [ 49K] plug1.pcap
│ │ └── [ 29K] plug2.pcap
│ ├── [4.0K] Unplugging
│ │ ├── [ 18K] unplug1.pcap
│ │ ├── [ 28K] unplug2.pcap
│ │ ├── [ 28K] unplug3.pcap
│ │ ├── [ 29K] unplug4.pcap
│ │ └── [ 48K] unplug5.pcap
│ ├── [132K] update.xml
│ └── [ 308] vendor_and_device_ID.txt
├── [1.0K] LICENSE
├── [3.7M] POC_AFW.gif
├── [3.4M] POC_WDOS.gif
└── [1.1K] README.md
4 directories, 16 files