Kernel / Drivers Exploits

All LPE exploits starting from 2023

Exploit CVE

CVE-2024-49138

Tested on Windows 11 23h2.

CVE-2024-38193

Tested on Windows 11 Pro 23H2 22631.3447

CVE-2024-35250 - Untrusted Pointer Dereference in the ks.sys driver

CVE-2024-30088

CVE-2024-30085

Affected Versions: Windows 11 23H2

CVE-2024-30090 - LPE PoC

CLFS PE - Windows 11

CVE-2023-21752 - Critical

CVE-2023-36874

CVE-2023-36802

Windows 11 22H2 systems

CVE-2023-29360

Exploit targeting MSKSSRV.SYS driver

CVE-2023-28252

Works on Windows 11 21H2 clfs.sys version 10.0.22000.1574 - also works on Windows 10 21H2, Windows 10 22H2, Windows 11 22H2 and Windows server 2022

CVE-2023-21768

CVE-2022-21882

Tested on windows 20h2 19042.1415

Notable Vulnerabilities

MS08-067

Windows Server 2000, 2003, and 2008 and Windows XP and Vista and allows an unauthenticated attacker to execute arbitrary code with SYSTEM privileges

MS17-010

SMBv1 protocol mishandles packets specially crafted by an attacker, leading to arbitrary code execution on the target host as the SYSTEM account.

Windows Exploit

ALPC Task Scheduler 0-Day

CVE-2021-36934 HiveNightmare, aka SeriousSam

Windows 10 flaw that results in ANY user having rights to read the Windows registry and access sensitive information regardless of privilege level. Researchers quickly developed a PoC exploit to allow reading of the SAM, SYSTEM, and SECURITY registry hives and create copies of them to process offline later and extract password hashes (including local admin) using a tool such as SecretsDump.py

Detection

Checking Permissions on the SAM File

SAM file is readable by the BUILTIN\Users group

Exploit

SAM & LSA secrets

CVE-2021-1675/CVE-2021-34527 PrintNightmare

Windows Exploit

Remotely

Powershell

By default, this script adds a new local admin user, but we can also supply a custom DLL to obtain a reverse shell or similar if adding a local admin user is not in scope.

Checking for Spooler Service

Adding Local Admin with PrintNightmare PowerShell PoC

Bypass Powershell Execution Policy

Enumerating Missing Patches

We can search for each KB (Microsoft Knowledge Base ID number) in the Microsoft Update Catalog to get a better idea of what fixes have been installed and how far behind the system may be on security updates.

CVE-2020-0668 Example

Building the solution should create the following files.

Pre-compiled:

We can use the exploit to create a file of our choosing in a protected folder such as C:\Windows\System32. We aren't able to overwrite any protected Windows files. This privileged file write needs to be chained with another vulnerability, such as UsoDllLoader or DiagHub to load the DLL and escalate our privileges. However, the UsoDllLoader technique may not work if Windows Updates are pending or currently being installed, and the DiagHub service may not be available.

We can also look for any third-party software, which can be leveraged, such as the Mozilla Maintenance Service. This service runs in the context of SYSTEM and is startable by unprivileged users. The (non-system protected) binary for this service is located below.

  • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

Generating Malicious Binary

Running the Exploit

Replacing File with Malicious Binary

Exploitation

Last updated