4.6
CVSSv2

CVE-2021-1732

Published: 25/02/2021 Updated: 29/12/2023
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 415
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Windows Win32k Elevation of Privilege Vulnerability

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows 10 1803

microsoft windows server 2019 -

microsoft windows 10 1809

microsoft windows server 2016 1909

microsoft windows 10 1909

microsoft windows 10 2004

microsoft windows server 2016 2004

microsoft windows 10 20h2

microsoft windows server 2016 20h2

Exploits

A vulnerability exists within win32k that can be leveraged by an attacker to escalate privileges to those of NT AUTHORITY\SYSTEM The flaw exists in how the WndExtra field of a window can be manipulated into being treated as an offset despite being populated by an attacker-controlled value This can be leveraged to achieve an out of bounds write op ...
A vulnerability exists within win32k that can be leveraged by an attacker to escalate privileges to those of NT AUTHORITY\SYSTEM The flaw exists in how the WndExtra field of a window can be manipulated into being treated as an offset despite being populated by an attacker-controlled value This can be leveraged to achieve an out of bounds write op ...

Github Repositories

CVE-2022-21882 win32k LPE bypass CVE-2021-1732 only tested on windows 20h2 190421415 twittercom/kalendsi/status/1483770845138804738

CVE-­2021­-1732 Microsoft Windows 10 本地提权漏 研究及Poc/Exploit开发

CVE-2021-1732 CVE-­2021­-1732 Microsoft Windows 10 本地提权漏 研究及Poc/Exploit开发 受影响系统及应用版本 Windows Server, version 20H2 (Server Core Installation) Windows 10 Version 20H2 for ARM64­based Systems Windows 10 Version 20H2 for 32­bit Systems Windows 10 Version 20H2 for x64­based Systems Windows Server, version 2004 (Server Core

CVE-2022-21882 Win32k Elevation Of Privileges Techniques inspired from: githubcom/L4ys/CVE-2022-21882 githubcom/exploitblizzard/Windows-Privilege-Escalation-CVE-2021-1732

CVE-2021-1732 Win32k Elevation Of Privileges Techniques inspired from: githubcom/L4ys/CVE-2022-21882 githubcom/exploitblizzard/Windows-Privilege-Escalation-CVE-2021-1732

CVE-2021-1732 Exploit

CVE-2021-1732-Exploit CVE-2021-1732 Exploit Only tested on windows10 1909 x64

HEVD && CVE Exploit

Kernel_Exploit _ __ _ _____ _ _ _ | |/ / ___ _ __ _ __ ___ | | | ____| __ __ _ __ | | ___ (_) | |_ | ' / / _ \ | '__| | '_ \ / _ \ | | | _| \ \/ / | '_ \ | | / _ \ | | | __| | \ | __/ | | | | | | | __/ | | | |___ &

do IPC inter-process communication LPE local Privilege escalation IPC 2021 Feb 21 - Offensive Windows IPC Internals 2: RPC | 📕 2021 Jan 10 - Offensive Windows IPC Internals 1: Named Pipes | 📕 Article [1] mediumcom/tenable-techblog/psexec-local-privilege-escalation-2e8069adc9c8 [2] bookhacktricksxyz/windows/windows-local-privilege-escalation/name

Windows Privilege Escalation Exploit for CVE-2021-1732 (Win32k) - Local Privilege Escalation *For educational and authorized security research purposes only* Original Exploit Authors @Exploit Blizzard Vulnerability Description A vulnerability exists within win32k that can be leveraged by an attacker to escalate privileges to those of NT AUTHORITY\SYSTEM The flaw exists in how

CVE-2021-1732-Exploit CVE-2021-1732 Exploit Only tested on windows10 1909 x64

CVE-­2021­-1732 Microsoft Windows 10 本地提权漏 研究及Poc/Exploit开发

CVE-2021-1732 CVE-­2021­-1732 Microsoft Windows 10 本地提权漏 研究及Poc/Exploit开发 受影响系统及应用版本 Windows Server, version 20H2 (Server Core Installation) Windows 10 Version 20H2 for ARM64­based Systems Windows 10 Version 20H2 for 32­bit Systems Windows 10 Version 20H2 for x64­based Systems Windows Server, version 2004 (Server Core

Read my blog for more info -

Windows Privilege Escalation CVE-2021-1732 Affected windows versions: Win10 1803 - 20H2, WinServer 2019, 2004 Screenshots:

Windows-Kernal-CVE CVE/issue编号 漏洞模块 漏洞类型 CVE-2021-1732 Win32kfullsys Type Confusion

CVE-­2021­-1732 Microsoft Windows 10 本地提权漏 研究及Poc/Exploit开发

CVE-2021-1732 CVE-­2021­-1732 Microsoft Windows 10 本地提权漏 研究及Poc/Exploit开发 受影响系统及应用版本 Windows Server, version 20H2 (Server Core Installation) Windows 10 Version 20H2 for ARM64­based Systems Windows 10 Version 20H2 for 32­bit Systems Windows 10 Version 20H2 for x64­based Systems Windows Server, version 2004 (Server Core

win32k LPE

CVE-2022-21882 win32k LPE bypass CVE-2021-1732 only tested on windows 20h2 190421415 twittercom/kalendsi/status/1483770845138804738

cve_2022_21882 If you read the below closely you will see that I note that the patch does not prevent NtUserConsoleControl from being called when the calling process is not csrssexe since a telemetry assert isn't "really" an assert Previously, this was sufficient to fix the issue since xxxClientAllocWindowClassExtraBytes was not called outside of xxxCreateWindo

Awesome Stars A curated list of my GitHub stars! Generated by stargazed 🏠 Contents AGS Script (1) ASL (1) ASP (2) Adblock Filter List (1) AngelScript (1) Assembly (12) AutoHotkey (3) AutoIt (1) Batchfile (13) Bicep (2) Bikeshed (1) Blade (1) C (573) C# (355) C++ (553) CMake (5) CSS (49) Clojure (24) CodeQL (1) CoffeeScript (4) Common Lisp (19) Coq (1) Crystal (4) Cuda

CVE-2021-1732 漏洞发生在Windows 图形驱动win32kfull!NtUserCreateWindowEx函数中的一处内核回调用户态分配内存与tagWND->flag属性设置不同步导致的漏洞。使得可以伪造这个tagWND->offset值发生内存越界。 当驱动win32kfullsys调用NtUserCreateWindowEx创建窗口时会判断tagWND->cbWndExtra(窗口实例额外

CVE-2022-21882

CVE-2022-21882 win32k LPE bypass CVE-2021-1732 Test only tested on windows 20h2 190421415 tested on windows 21H1 (not working) Download rawgithubusercontentcom/David-Honisch/CVE-2022-21882/main/x64/Release/CVE-2021-1732exe Many thanks to Kalendski Based on: twittercom/kalendsi/status/1483770845138804738

存储各类渗透测试 工具/exp等

本项目为存储各类已披露利用脚本或工具 FoFa Search 基于Python3编写的具有图形化界面的FoFa搜索工具 UI设定尺寸符合MAC使用,可填写key后自行编译使用 CVE-2021-3156 Linux sudo 提权 CVE-2021-1732 Microsoft Windows本地提权漏洞 泛微 泛微e-cology V8 前台sql注入 泛微e-cology BeanShell组件命令执行 泛

Recent Articles

Microsoft Patch Tuesday gaffe leads netizens to 'Microosft' typo-squatting domain
The Register • Thomas Claburn in San Francisco • 09 Feb 2021

That aside, enjoy the light load of 56 vulns in Windows and other code Rubbish software security patches responsible for a quarter of zero-days last year

Patch Tuesday For its February Patch Day, Microsoft released security advisories covering 56 CVE-assigned vulnerabilities, 11 of them rated critical. In doing so, the Windows giant managed to publish a misspelled URL on the landing page for its February updates that instead of taking visitors to the intended Microsoft Security Response Center post about API changes, pointed to msrc-blog.microosft.com, which turns out to be a typo-bait domain. It redirects visitors to a findanswersnow.net search ...

Raspberry Robin devs are buying exploits for faster attacks
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources One of most important malware loaders to cybercrims who are jumping on vulnerabilities faster than ever

Researchers suspect the criminals behind the Raspberry Robin malware are now buying exploits for speedier cyberattacks. An exploit developer is thought by infosec pros to be either on the Raspberry Robin payroll or a close contact that sells them to the group – most likely the latter. That's according to Check Point Research (CPR) which has tracked how long it takes for vulnerability exploits to be added as features to the malware. In 2022, Raspberry Robin added exploits for vulnerabilities th...