Skip to main content

CVE-2023-21768

Description

Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

microsoft
CVE ID: CVE-2023-21768
Base Score: 7.8
Base Severity: HIGH
Vector String:CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Impact Score: 5.9
Exploitability Score: 1.8
microsoft
CVE ID: CVE-2023-21768
Base Score: 7.8
Base Severity: HIGH
Vector String:CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Proof Of Concept

chompie1337

LPE exploit for CVE-2023-21768

Refrence: GitHub

cl4ym0re

cve-2023-21768

Refrence: GitHub

SamuelTulach

Using CVE-2023-21768 to manual map kernel mode driver

Refrence: GitHub

Malwareman007

Windows_AFD_LPE_CVE-2023-21768

Refrence: GitHub

HKxiaoli

Windows 11 System Permission Elevation

Refrence: GitHub

3yujw7njai

CVE-2023-21768 Windows 11 22H2 系统本地提权 POC

Refrence: GitHub

h1bAna

Refrence: GitHub

zoemurmure

Refrence: GitHub

Rosayxy

recreating exp for cve-2023-21768.

Refrence: GitHub

ldrx30

CVE-2023-21768 Proof of Concept

Refrence: GitHub

xboxoneresearch

C# / .NET version of CVE-2023-21768

Refrence: GitHub

Refrence: NVDMITRE