[local] Windows 11 10.0.22000 - Backup service Privilege Escalation
source link: https://www.exploit-db.com/exploits/51203
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
Windows 11 10.0.22000 - Backup service Privilege Escalation
## Title: Windows 11 10.0.22000 - Backup service Privilege Escalation
## Author: nu11secur1ty
## Date: 01.13.2023
## Vendor: https://www.microsoft.com/
## Software: https://www.microsoft.com/en-us/software-download/windows11
## Reference: https://github.com/nu11secur1ty/CVE-mitre/tree/main/2023/CVE-2023-21752
## Description:
Windows 11 Pro build 10.0.22000 Build 22000 suffers from Backup
service - Privilege Escalation vulnerability.
An attacker who successfully exploited this vulnerability could gain
SYSTEM privileges.
and could delete data that could include data that results in the
service being unavailable.
## STATUS: HIGH Vulnerability - CRITICAL
[+] Exploit:
[href](https://github.com/nu11secur1ty/CVE-mitre/tree/main/2023/CVE-2023-21752/PoC)
## Reference:
[href](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21752)
## Reproduce:
[href](https://github.com/nu11secur1ty/CVE-mitre/tree/main/2023/CVE-2023-21752/PoC)
## Proof and Exploit:
[href](https://streamable.com/f2dl3m)
--
System Administrator - Infrastructure Engineer
Penetration Testing Engineer
Exploit developer at https://packetstormsecurity.com/
https://cve.mitre.org/index.html https://0day.today/
https://cxsecurity.com/ and https://www.exploit-db.com/
home page: https://www.nu11secur1ty.com/
hiPEnIMR0v7QCo/+SEH9gBclAAYWGnPoBIQ75sCj60E=
nu11secur1ty <http://nu11secur1ty.com/>
Recommend
-
12
Local Privilege Escalation Edition of CVE-2021-1675 Local Privilege Escalation implementation of the CVE-2021-1675 (a.k.a PrintNightmare). The exploit is edited from published by Zhiniang Peng (@edwardzpeng) & Xuefeng Li (@lxf029...
-
23
Usage RoguePotato @splinter_code & @decoder_it Mandatory args: -r remote_ip: ip of the remote machine to use as redirector -e commandline: commandline of the program to launch Optional args: -l listen...
-
6
Analyzing the PwnKit local privilege escalation exploit Kyle Suero, Matt Jarvis January 29, 2022 W...
-
6
In this blog post, we will share the details of a vulnerability Offensive Security discovered in the XPC service of Microsoft OneDrive. Although Microsoft secured these services reasonably well, we will see how small mistakes in the code can...
-
4
Zillya Total Security 3.0.2367.0 - Local Privilege Escalation...
-
1
SOUND4 Server Service 4.1.102 - Local Privilege Escalation
-
3
Enlightenment v0.25.3 - Privilege escalation ...
-
3
sudo 1.8.0 to 1.9.12p1 - Privilege Escalation ...
-
2
HotKey Clipboard 2.1.0.6 - Privilege Escalation Unquoted Service Path...
-
5
MobileTrans 4.0.11 - Weak Service Privilege Escalation ...
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK