{"id":15304,"date":"2023-06-14T10:05:17","date_gmt":"2023-06-14T10:05:17","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=15304"},"modified":"2023-06-15T10:19:40","modified_gmt":"2023-06-15T10:19:40","slug":"poc-exploit-for-a-vulnerability-in-win32k","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/poc-exploit-for-a-vulnerability-in-win32k\/","title":{"rendered":"Information Security Experts Published a PoC Exploit for a Vulnerability in Win32k"},"content":{"rendered":"<p><h4>Information security experts have published a PoC exploit for a privilege escalation vulnerability in the Win32k driver that was fixed in May.<\/h4>\n<\/p>\n<p>Let me remind you that this bug received the identifier <strong><a rel=\"noopener noreferrer nofollow\" target=\"_blank\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29336\">CVE-2023-29336<\/a><\/strong> (7.8 points on the CVSS scale) and was discovered by <strong>Avast<\/strong> researchers. <strong>CVE-2023-29336<\/strong> has been reported to affect systems running <strong>Windows 10<\/strong> and Windows Server 2008, 2012, and 2016.<\/p>\n<div class=\"su-quote su-quote-style-default su-quote-has-cite\"><div class=\"su-quote-inner su-u-clearfix su-u-trim\">An attacker who successfully exploited this vulnerability could gain SYSTEM-level privileges.<span class=\"su-quote-cite\"><strong>Microsoft<\/strong> said in a statement.<\/span><\/div><\/div>\n<p>Back in May, Avast specialists warned that they had already recorded attacks on <strong>CVE-2023-29336<\/strong>, but nothing concrete was reported about them.<\/p>\n<p>We also wrote that <a href=\"\/blogs\/vulnerabilities-in-wordpress-plugins\/\">Exploits for Vulnerabilities in Three Popular <strong>WordPress<\/strong> Plugins Appeared on the Network<\/a>, and also that <a href=\"\/blogs\/github-repositories-spread-malware\/\">Thousands of <strong>GitHub<\/strong> Repositories Spread Malware That Is Disguised as Exploits<\/a>.<\/p>\n<p>Also the information security specialists pointed out that <a target=\"_blank\" href=\"https:\/\/howtofix.guide\/poc-exploit-for-fortinet\/\" rel=\"noopener nofollow\">A PoC Exploit Is Already Available for a Critical RCE Problem in <strong>Fortinet<\/strong> Products<\/a>.<\/p>\n<p>In turn, the US Cybersecurity and Infrastructure Security Agency (<strong>CISA<\/strong>) added this issue to its catalog of known exploitable vulnerabilities (<strong><a rel=\"noopener noreferrer nofollow\" target=\"_blank\" href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\">KEV<\/a><\/strong>), and urged organizations to install patches by May 30, 2023.<\/p>\n<p>Now, a month after the release of the patch, analysts from <strong>Numen<\/strong> <a rel=\"noopener noreferrer nofollow\" target=\"_blank\" href=\"http:\/\/www.numencyber.com\/cve-2023-29336-win32k-analysis\/\">have published full technical information about the vulnerability<\/a>, as well as a PoC exploit for Windows Server 2016.<\/p>\n<p>Experts say that although the vulnerability is not suitable for attacks on Windows 11, it poses a significant risk to older versions of the OS, including older versions of Windows 10, Windows Server and Windows 8.<\/p>\n<p>In their report, the researchers explain that they experimented with various memory manipulation techniques, exploit triggers, and memory read\/write functions, which ultimately helped them create a working exploit that provides reliable privilege escalation to the SYSTEM level.<\/p>\n<p>A demonstration of the exploit is shown in the video below.<\/p>\n<p><iframe loading=\"lazy\" title=\"CVE-2023-29336 Exploit Demo on Windows Server 2016\" width=\"1240\" height=\"930\" src=\"https:\/\/www.youtube.com\/embed\/fDgq8FyXVvU?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p>Overall, the researchers concluded that exploiting <strong>CVE-2023-29336<\/strong> does not appear to be particularly difficult and is likely to remain a security risk to older systems.<\/p>\n<p>Numen engineers advise system administrators to watch for anomalous offset read\/write operations or related window objects, which may indicate active exploitation of <strong>CVE-2023-29336<\/strong> for local privilege escalation.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Information security experts have published a PoC exploit for a privilege escalation vulnerability in the Win32k driver that was fixed in May. Let me remind you that this bug received the identifier CVE-2023-29336 (7.8 points on the CVSS scale) and was discovered by Avast researchers. CVE-2023-29336 has been reported to affect systems running Windows 10 [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":15306,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[210,315,16],"class_list":{"0":"post-15304","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"tag-avast","9":"tag-exploit","10":"tag-windows"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/06\/PoC-Exploit-for-a-vulnerability-in-Win32k.jpg","author_info":{"display_name":"Vladimir Krasnogolovy","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/krasnogolovy\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/15304","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=15304"}],"version-history":[{"count":1,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/15304\/revisions"}],"predecessor-version":[{"id":15305,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/15304\/revisions\/15305"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/15306"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=15304"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=15304"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=15304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}