7.8
CVSSv3

CVE-2023-36802

Published: 12/09/2023 Updated: 14/09/2023
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows server 2019 -

microsoft windows server 2022 -

microsoft windows 11 22h2

microsoft windows 10 1809

microsoft windows 10 22h2

microsoft windows 11 21h2

microsoft windows 10 21h2

Github Repositories

PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy

CVE-2023-36802 MSKSSRVsys Local Privilege Escalation PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy which suffers from a type confusion vulnerability This proof-of-concept is modeled after the write-up done by Benoît Sevens (@benoitsevens) The article can be found here: googleprojectzerogithubio/0days-in-the-wild//0day-RCAs/2023/CVE-2023-3680

LPE exploit for CVE-2023-36802

CVE-2023-36802 Local Privilege Escalation POC authors: chompie For demonstration purposes only Complete exploit works on vulnerable Windows 11 22H2 systems Adapting the exploit to all vulnerable systems is left as an exercise to the reader Git gud, etc Usage: Windows_MSKSSRV_LPE_CVE-2023-6802exe <pid> where <pid&

LPE exploit for CVE-2023-36802

CVE-2023-36802 Local Privilege Escalation POC authors: chompie For demonstration purposes only Complete exploit works on vulnerable Windows 11 22H2 systems Adapting the exploit to all vulnerable systems is left as an exercise to the reader Git gud, etc Usage: Windows_MSKSSRV_LPE_CVE-2023-6802exe <pid> where <pid&

CVE-2023-36802 ITW case

CVE-2023-36802 CVE-2023-36802 ITW case Explain Using PreviousMode overwrite primitive cwresearchtistorycom/entry/Microsoft-Streaming-Service-Proxy-Elevation-of-Privilege-Vulnerability-CVE-2023-36802 Thanks to chompie Google Project 0

Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver

PoC for CVE-2023-36802 Exploit targeting MSKSSRVSYS driver The complete exploit works on vulnerable Windows 11 & 10 systems Note If you have any cool tricks & tips that will make this exploit better I'm open to any suggestions :) Credits Valentina Palmiotti (@chompie1337) from IBM X Force Google's project zero analysis

Recent Articles

Grab those updates: Microsoft flings out fixes for already-exploited bugs
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Plus: Adobe and Android also tackle abused-in-the-wild flaws

Patch Tuesday It's every Windows admin's favorite day of the month: Patch Tuesday. Microsoft emitted 59 patches for its September update batch, including two for bugs that have already been exploited. Five others are listed as critical. Let's start with the two currently under exploitation. First up: CVE-2023-36761, an information disclosure vulnerability in Word deemed "important" by Redmond with a 6.2 out of 10 CVSS severity rating. The preview pane is the attack vector for this bug, which cou...

Raspberry Robin devs are buying exploits for faster attacks
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources One of most important malware loaders to cybercrims who are jumping on vulnerabilities faster than ever

Researchers suspect the criminals behind the Raspberry Robin malware are now buying exploits for speedier cyberattacks. An exploit developer is thought by infosec pros to be either on the Raspberry Robin payroll or a close contact that sells them to the group – most likely the latter. That's according to Check Point Research (CPR) which has tracked how long it takes for vulnerability exploits to be added as features to the malware. In 2022, Raspberry Robin added exploits for vulnerabilities th...