Win10 20H2 LPE for CVE-2021-31956
CVE-2021-31956 pretty stable exploit on win10 20h2 creates new console window so change that if you don't like oh and more importantly, change the createfilea() path to an actual writeable directory on disk
Windows NTFS Elevation of Privilege Vulnerability
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
microsoft windows server 2008 r2 |
||
microsoft windows server 2012 r2 |
||
microsoft windows 10 1607 |
||
microsoft windows 8.1 - |
||
microsoft windows server 2016 - |
||
microsoft windows 7 - |
||
microsoft windows rt 8.1 - |
||
microsoft windows server 2012 - |
||
microsoft windows 10 - |
||
microsoft windows server 2008 sp2 |
||
microsoft windows server 2019 - |
||
microsoft windows 10 1809 |
||
microsoft windows 10 1909 |
||
microsoft windows 10 2004 |
||
microsoft windows server 2016 2004 |
||
microsoft windows 10 20h2 |
||
microsoft windows server 2016 20h2 |
||
microsoft windows 10 21h1 |
Targeted attack attribution is always a tricky thing, and in general, we believe that attribution is best left to law enforcement agencies. The reason is that, while in 90%, it is possible to understand a few things about the attackers, such as their native language or even location, the remaining 10% can lead to embarrassing attribution errors or worse. High-profile actors make every effort to stay undetected inside the victim’s infrastructure and to leave as few traces as they can. They impl...