Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-24076 PoC — Microsoft Windows 访问控制错误漏洞

Source
Associated Vulnerability
Title:Microsoft Windows 访问控制错误漏洞 (CVE-2025-24076)
Description:Microsoft Windows是美国微软(Microsoft)公司的一套个人设备使用的操作系统。 Microsoft Windows存在访问控制错误漏洞。攻击者利用该漏洞可以提升权限。以下产品和版本受到影响:Windows 11 Version 22H2 for ARM64-based Systems,Windows 11 Version 22H2 for x64-based Systems,Windows Server 2025 (Server Core installation),Windows
Readme
# CVE-2025-24076

# Microsoft Windows Cross Device Service Elevation of Privilege Vulnerability Exploit

---

## Overview

This script exploits a vulnerability in the **Windows Cross Device Service** that allows privilege escalation on **Windows 11**, **Windows Server 2025**, and **Windows Server 2022 23H2 (Server Core installation)** systems.

- **CVE:** CVE-2025-24076  
- **CVSS v3.1 Score:** 7.3 (Important)  
- **Type:** Elevation of Privilege  
- **Weakness:** CWE-284 - Improper Access Control  
- **Attack Vector:** Local  
- **Privileges Required:** Low  
- **User Interaction:** Required  

---

## Description

The vulnerability stems from improper access control in the Windows Cross Device Service, allowing a low-privileged local attacker to overwrite a critical DLL file (`CrossDevice.Streaming.Source.dll`) located in a writable directory.

When the user opens the Windows "Mobile devices" Settings page, the system loads this DLL. If the attacker replaces it with a malicious DLL, the code executes with SYSTEM privileges, resulting in full privilege escalation.

---

## Affected Systems

- Windows 11 Versions 24H2, 23H2, 22H2 (x64 and ARM64)  
- Windows Server 2025  
- Windows Server 2022 23H2 (Server Core installation)  

---

## Exploitation Steps

1. Check for the presence of the target DLL in the writable directory.  
2. Build a malicious DLL that executes code with SYSTEM privileges on load.  
3. Backup the original DLL to allow recovery.  
4. Prompt the user to open the "Mobile devices" Settings page to trigger DLL loading.  
5. Monitor the DLL file until it is unlocked, then replace it with the malicious DLL.  
6. Achieve SYSTEM privileges once the malicious DLL is loaded by the system.  

---

## Usage Instructions

1. Ensure you have `gcc` (MinGW) installed for compiling the malicious DLL from C source code.  
2. Run the Python script as a low-privileged user.  
3. Follow the on-screen instructions to open the Windows Settings page as requested.  
4. Check for the file `C:\poc_only_admin_can_write_to_c.txt` as confirmation of successful exploitation.


---

## Warnings and Legal Notice

- This exploit is provided for educational and research purposes only.  
- Unauthorized use on systems without explicit permission is illegal and punishable by law.  
- Use this exploit only on systems you own or in a controlled lab environment.  

---

## Updates

Keep your systems patched by applying official Microsoft updates to mitigate this vulnerability.

---

## Script Details

The exploit script is written in Python and uses `gcc` (MinGW) to compile a malicious DLL. It performs DLL replacement after detecting that the original DLL is unlocked, triggering privilege escalation once the malicious DLL is loaded by the system.

---

If you need help running the script or further explanations, feel free to ask! 😊

---

## Author

- **Name:** Mohammed Idrees Banyamer  
- **Instagram:** [@banyamer_security](https://instagram.com/banyamer_security)  
- **GitHub:** [https://github.com/mbanyamer](https://github.com/mbanyamer)  
- **Country:** Jordan  
- **Date:** 2025-06-06  
File Snapshot

[4.0K] /data/pocs/b54cffe926624296b14acea8bb5cfab5da2a2a64 ├── [5.7K] exploit-CVE-2025-24076.py ├── [ 34K] LICENSE └── [3.1K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.