0% found this document useful (0 votes)
437 views1 page

Win11 Backup SVC Priv - Esc

Windows 11 Pro build 10.0.22000 suffers from a critical privilege escalation vulnerability in the Backup service. An attacker could exploit this vulnerability to gain SYSTEM privileges, allowing them to delete data and make the service unavailable. Microsoft has acknowledged the issue and provided references to proof-of-concept code and an exploit video demonstrating how an attacker could leverage the vulnerability.

Uploaded by

scribdfoo1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
437 views1 page

Win11 Backup SVC Priv - Esc

Windows 11 Pro build 10.0.22000 suffers from a critical privilege escalation vulnerability in the Backup service. An attacker could exploit this vulnerability to gain SYSTEM privileges, allowing them to delete data and make the service unavailable. Microsoft has acknowledged the issue and provided references to proof-of-concept code and an exploit video demonstrating how an attacker could leverage the vulnerability.

Uploaded by

scribdfoo1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 1

## Title: Windows 11 10.0.

22000 - Backup service Privilege Escalation


## Author: nu11secur1ty
## Date: 01.13.2023
## Vendor: https://www.microsoft.com/
## Software: https://www.microsoft.com/en-us/software-download/windows11
## Reference: https://github.com/nu11secur1ty/CVE-mitre/tree/main/2023/CVE-2023-
21752

## Description:
Windows 11 Pro build 10.0.22000 Build 22000 suffers from Backup
service - Privilege Escalation vulnerability.
An attacker who successfully exploited this vulnerability could gain
SYSTEM privileges.
and could delete data that could include data that results in the
service being unavailable.

## STATUS: HIGH Vulnerability - CRITICAL

[+] Exploit:
[href](https://github.com/nu11secur1ty/CVE-mitre/tree/main/2023/CVE-2023-21752/PoC)

## Reference:
[href](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21752)

## Reproduce:
[href](https://github.com/nu11secur1ty/CVE-mitre/tree/main/2023/CVE-2023-21752/PoC)

## Proof and Exploit:


[href](https://streamable.com/f2dl3m)

--
System Administrator - Infrastructure Engineer
Penetration Testing Engineer
Exploit developer at https://packetstormsecurity.com/
https://cve.mitre.org/index.html https://0day.today/
https://cxsecurity.com/ and https://www.exploit-db.com/
home page: https://www.nu11secur1ty.com/
hiPEnIMR0v7QCo/+SEH9gBclAAYWGnPoBIQ75sCj60E=
nu11secur1ty <http://nu11secur1ty.com/>

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy