CVE-2023-21768
Description
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
- CVSS Version 3.1
microsoft
CVE ID: CVE-2023-21768
Base Score: 7.8
Base Severity: HIGH
Vector String:CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Impact Score: 5.9
Exploitability Score: 1.8
microsoft
CVE ID: CVE-2023-21768
Base Score: 7.8
Base Severity: HIGH
Vector String:CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Proof Of Concept
chompie1337
LPE exploit for CVE-2023-21768
Refrence: GitHub
cl4ym0re
cve-2023-21768
Refrence: GitHub
SamuelTulach
Using CVE-2023-21768 to manual map kernel mode driver
Refrence: GitHub
Malwareman007
Windows_AFD_LPE_CVE-2023-21768
Refrence: GitHub
HKxiaoli
Windows 11 System Permission Elevation
Refrence: GitHub
3yujw7njai
CVE-2023-21768 Windows 11 22H2 系统本地提权 POC
Refrence: GitHub
h1bAna
Refrence: GitHub
zoemurmure
Refrence: GitHub
Rosayxy
recreating exp for cve-2023-21768.
Refrence: GitHub
ldrx30
CVE-2023-21768 Proof of Concept
Refrence: GitHub
xboxoneresearch
C# / .NET version of CVE-2023-21768
Refrence: GitHub