7.8
CVSSv3

CVE-2023-28252

Published: 11/04/2023 Updated: 29/05/2024
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

Windows Common Log File System Driver Elevation of Privilege Vulnerability

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows server 2008 r2

microsoft windows server 2012 r2

microsoft windows server 2016 -

microsoft windows server 2008 -

microsoft windows server 2012 -

microsoft windows server 2019 -

microsoft windows server 2022 -

microsoft windows 10 20h2

microsoft windows 11 21h2

microsoft windows 10 21h2

microsoft windows 11 22h2

microsoft windows 10 22h2

microsoft windows 10 1809

microsoft windows 10 1607

microsoft windows 10 1507

Exploits

A privilege escalation vulnerability exists in the clfssys driver which comes installed by default on Windows 10 21H2, Windows 11 21H2 and Windows Server 20348 operating systems This Metasploit module exploit makes use to two different kinds of specially crafted blf files ...

Github Repositories

My HTB Writeups

HTB_Writeups My HTB Writeups, some in ENG and others in PT-BR Some writeups don't have a writeup, they only have a reference writeup Windows Machines Machine Resume Tools or Techniques Difficulty Absolute nmap, netexec, exiftool, john rules, kerbrute, impacket-GetNPUsers, john, impacket-getTGT, impacket-smbclient, bloodhound-python, bloodhound, impacket-owneredit,

A modification to fortra's CVE-2023-28252 exploit, compiled to exe

CVE-2023-28252-Compiled-exe A modification of Fortra's excellent CVE-2023-2852 Privesc Exploit Works on Windows 11 21H2 clfssys version 100220001574 - also works on Windows 10 21H2, Windows 10 22H2, Windows 11 22H2 and Windows server 2022 This version retains the original functionality, but gives the option to provide a binary to execute as an argument, useful if you

Since February 2022 was reported a new ransomware that appears to be using a Windows 0-day vulnerability, according to the research conducted by Trend Micro More information about this ransomware can be found at this link According to analysis by Kaspersky, the Nokoyawa ransomware group has used other exploits targeting the Common Log File System (CLFS) driver since June 2022

Since February 2022 was reported a new ransomware that appears to be using a Windows 0-day vulnerability, according to the research conducted by Trend Micro More information about this ransomware can be found at this link According to analysis by Kaspersky, the Nokoyawa ransomware group has used other exploits targeting the Common Log File System (CLFS) driver since June 2022

Обнаружение эксплойта CVE-2023-28252

CVE-2023-28252- Обнаружение эксплойта CVE-2023-28252 Контроль создания файлов в директории, в котором эксплойт оставляет файлы, используемые для эксплуатации, по жестко заданному пути в папке "C:\Users\Public", "C:\Users\Public

CVE-2023-28252 CVE-2023-28252 CLFS 提权漏洞POC

The repo contains a precompiled binary which can be run on a Windows machine vulnerable to CVE-2023-28252

Compiled PoC Binary For CVE-2023-28252 The repo contains a precompiled binary which can be run on a Windows machine vulnerable to CVE-2023-28252 The precompiled binary is a slightly modified version of the PoC exploit seen in fortra's repo The file can be run with the following arguments: clfs_eopexe <PAYLOAD> <OFFSET,optional> <FLAG,op

My bin folder, tools I created as FOSS

Our "bin folder" tools Tools we created as FOSS You'll find a lot more infos in our Blog: blognetwork-secde/ For OSINT and Recon, IP enumeration etc, have a look at this article: blognetwork-secde/post/open_source_intelligence_2024_eu_version/ A Word On Quality We'd like to note, not all the tools listed below are our most interesting p

Recent Articles

Exploits and vulnerabilities in Q1 2024
Securelist • Alexander Kolesnikov • 07 May 2024

We at Kaspersky continuously monitor the evolving cyberthreat landscape to ensure we respond promptly to emerging threats, equipping our products with detection logic and technology. Software vulnerabilities that threat actors can exploit or are already actively exploiting are a critical component of that landscape. In this report, we present a series of insightful statistical and analytical snapshots relating to the trends in the emergence of new vulnerabilities and exploits, as well as the mos...

IT threat evolution in Q2 2023
Securelist • David Emm • 30 Aug 2023

IT threat evolution in Q2 2023 IT threat evolution in Q2 2023. Non-mobile statistics IT threat evolution in Q2 2023. Mobile statistics Targeted attacks Gopuram backdoor deployed through 3CX supply-chain attack Earlier this year, a Trojanized version of the 3CXDesktopApp, a popular VoIP program, was used in a high-supply-chain attack. The attackers were able to embed malicious code into the libffmpeg media processing library to download a payload from their servers. When we reviewed our telemetry...

IT threat evolution in Q2 2023. Non-mobile statistics
Securelist • AMR • 30 Aug 2023

IT threat evolution in Q2 2023 IT threat evolution in Q2 2023. Non-mobile statistics IT threat evolution in Q2 2023. Mobile statistics These statistics are based on detection verdicts of Kaspersky products and services received from users who consented to providing statistical data. Quarterly figures According to Kaspersky Security Network, in Q2 2023: Kaspersky solutions blocked 801,934,281 attacks from online resources across the globe. A total of 209,716,810 unique links were detected by Web ...

Nokoyawa ransomware attacks with Windows zero-day
Securelist • Boris Larin • 11 Apr 2023

In February 2023, Kaspersky technologies detected a number of attempts to execute similar elevation-of-privilege exploits on Microsoft Windows servers belonging to small and medium-sized businesses in the Middle East, in North America, and previously in Asia regions. These exploits were very similar to already known Common Log File System (CLFS) driver exploits that we analyzed previously, but we decided to double check and it was worth it – one of the exploits turned out to be a zero-day, sup...

April Patch Tuesday: Ransomware gangs already exploiting this Windows bug
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Plus Google, SAP, Adobe and Cisco emit fixes

Microsoft patched 97 security flaws today for April's Patch Tuesday including one that has already been found and exploited by miscreants attempting to deploy Nokoyawa ransomware. Redmond deemed seven of the now-patched vulnerabilities "critical" and the rest merely "important." Microsoft, as usual, didn't disclose the extent of attacks against CVE-2023-28252, a privilege elevation bug in the Windows Common Log File System (CLFS) driver, infosec folk say they've spotted attempts to deploy the No...