Skip to content

Latest commit

 

History

History
21 lines (12 loc) · 798 Bytes

README.md

File metadata and controls

21 lines (12 loc) · 798 Bytes

CVE-2023-21768 Local Privilege Escalation POC

authors: chompie & b33f

For demonstration purposes only. Complete exploit works on vulnerable Windows 11 22H2 systems. Write primitive works on all vulnerable systems.

Usage:

Windows_AFD_LPE_CVE-2023-21768.exe <pid>

where <pid> is the process ID (in decimal) of the process to elevate.

Should result in the target process being elevated to SYSTEM

The I/O Ring LPE primitive code is based on the I/ORing R/W PoC by Yarden Shafir

Blog post here