Kernel / Drivers Exploits

All LPE exploits starting from 2023
Exploit CVECVE-2024-49138
Tested on Windows 11 23h2.
CVE-2024-38193
Tested on Windows 11 Pro 23H2 22631.3447
CVE-2024-35250 - Untrusted Pointer Dereference in the ks.sys driver
CVE-2024-30088
CVE-2024-30085
Affected Versions: Windows 11 23H2
CVE-2024-30090 - LPE PoC
CLFS PE - Windows 11
CVE-2023-21752 - Critical
CVE-2023-36874
CVE-2023-36802
Windows 11 22H2 systems
CVE-2023-29360
Exploit targeting MSKSSRV.SYS driver
CVE-2023-28252
Works on Windows 11 21H2 clfs.sys version 10.0.22000.1574 - also works on Windows 10 21H2, Windows 10 22H2, Windows 11 22H2 and Windows server 2022
CVE-2023-21768
CVE-2022-21882
Tested on windows 20h2 19042.1415
Notable Vulnerabilities
MS08-067
Windows Server 2000, 2003, and 2008 and Windows XP and Vista and allows an unauthenticated attacker to execute arbitrary code with SYSTEM privileges
MS17-010
SMBv1 protocol mishandles packets specially crafted by an attacker, leading to arbitrary code execution on the target host as the SYSTEM account.
Windows ExploitALPC Task Scheduler 0-Day
CVE-2021-36934 HiveNightmare, aka SeriousSam
Windows 10 flaw that results in ANY user having rights to read the Windows registry and access sensitive information regardless of privilege level. Researchers quickly developed a PoC exploit to allow reading of the SAM, SYSTEM, and SECURITY registry hives and create copies of them to process offline later and extract password hashes (including local admin) using a tool such as SecretsDump.py
Detection
Checking Permissions on the SAM File
SAM file is readable by the BUILTIN\Users group
Exploit
SAM & LSA secretsCVE-2021-1675/CVE-2021-34527 PrintNightmare
Windows ExploitRemotely
Powershell
By default, this script adds a new local admin user, but we can also supply a custom DLL to obtain a reverse shell or similar if adding a local admin user is not in scope.
Checking for Spooler Service
Adding Local Admin with PrintNightmare PowerShell PoC
Bypass Powershell Execution PolicyEnumerating Missing Patches
We can search for each KB (Microsoft Knowledge Base ID number) in the Microsoft Update Catalog to get a better idea of what fixes have been installed and how far behind the system may be on security updates.
CVE-2020-0668 Example
Building the solution should create the following files.
Pre-compiled:
We can use the exploit to create a file of our choosing in a protected folder such as C:\Windows\System32. We aren't able to overwrite any protected Windows files. This privileged file write needs to be chained with another vulnerability, such as UsoDllLoader or DiagHub to load the DLL and escalate our privileges. However, the UsoDllLoader technique may not work if Windows Updates are pending or currently being installed, and the DiagHub service may not be available.
We can also look for any third-party software, which can be leveraged, such as the Mozilla Maintenance Service. This service runs in the context of SYSTEM and is startable by unprivileged users. The (non-system protected) binary for this service is located below.
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
Generating Malicious Binary
Running the Exploit
Replacing File with Malicious Binary
Exploitation
Last updated
