Windows_AFD_LPE_CVE-2023-21768# CVE-2023-21768 Local Privilege Escalation POC
authors: [chompie](https://twitter.com/chompie1337) & [b33f](https://twitter.com/FuzzySec)
For demonstration purposes only. Complete exploit works on vulnerable Windows 11 22H2 systems.
Write primitive works on all vulnerable systems.
Usage:
```
Windows_AFD_LPE_CVE-2023-21768.exe <pid>
```
where `<pid>` is the process ID (in decimal) of the process to elevate.
Should result in the target process being elevated to SYSTEM
https://user-images.githubusercontent.com/86009160/224833738-5d6ca2be-fb1d-4d92-85b3-ad1cb1a28472.mp4
[4.0K] /data/pocs/9b633e46215508429724b710ad190c67adf968e0
├── [4.0K] CVE-2023-21768
│ ├── [6.2K] exploit.c
│ ├── [2.3K] ioring.h
│ ├── [8.0K] ioring_lpe.c
│ ├── [7.0K] win_defs.h
│ ├── [6.7K] Windows_AFD_LPE_CVE-2023-21768.vcxproj
│ └── [1.3K] Windows_AFD_LPE_CVE-2023-21768.vcxproj.filters
├── [1.4K] CVE-2023-21768.sln
├── [ 34K] LICENSE
└── [ 586] README.md
1 directory, 9 files