Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-21768— Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

CVSS 7.8 · High EPSS 75.80% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-21768

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
非可信指针解引用
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Windows Ancillary Function Driver for WinSock 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft Windows Ancillary Function Driver for WinSock是美国微软(Microsoft)公司的Winsock 的辅助功能驱动程序。 Microsoft Windows Ancillary Function Driver for WinSock存在安全漏洞。攻击者利用该漏洞可以提升权限。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
MicrosoftWindows Server 2022 10.0.20348.0 ~ 10.0.20348.1487 -
MicrosoftWindows 11 version 21H2 10.0.0 ~ 10.0.22000.1455 -
MicrosoftWindows 11 version 22H2 10.0.22621.0 ~ 10.0.22621.1105 -

II. Public POCs for CVE-2023-21768

#POC DescriptionSource LinkShenlong Link
1LPE exploit for CVE-2023-21768https://github.com/chompie1337/Windows_LPE_AFD_CVE-2023-21768POC Details
2cve-2023-21768https://github.com/cl4ym0re/cve-2023-21768-compiledPOC Details
3Using CVE-2023-21768 to manual map kernel mode driver https://github.com/SamuelTulach/nullmapPOC Details
4Windows_AFD_LPE_CVE-2023-21768https://github.com/Malwareman007/CVE-2023-21768POC Details
5Windows 11 System Permission Elevationhttps://github.com/HKxiaoli/Windows_AFD_LPE_CVE-2023-21768POC Details
6CVE-2023-21768 Windows 11 22H2 系统本地提权 POChttps://github.com/CKevens/CVE-2023-21768-POCPOC Details
7Nonehttps://github.com/h1bAna/CVE-2023-21768POC Details
8Nonehttps://github.com/zoemurmure/CVE-2023-21768-AFD-for-WinSock-EoP-exploitPOC Details
9recreating exp for cve-2023-21768.https://github.com/Rosayxy/Recreate-cve-2023-21768POC Details
10CVE-2023-21768 Proof of Concepthttps://github.com/Ha0-Y/CVE-2023-21768POC Details
11C# / .NET version of CVE-2023-21768https://github.com/xboxoneresearch/CVE-2023-21768-dotnetPOC Details
12Using CVE-2023-21768 to manual map kernel mode driver https://github.com/SultanPLX/SamuelTulach_nullmapPOC Details
13CVE-2023-21768 Windows 11 22H2 系统本地提权 POChttps://github.com/3yujw7njai/CVE-2023-21768-POCPOC Details
14CVE-2023-21768 Proof of Concepthttps://github.com/ldrx30/CVE-2023-21768POC Details
15Exploit implementation with IO Rings for CVE-2023-21768https://github.com/IlanDudnik/CVE-2023-21768POC Details
16CVE-2023-21768 Windows 11 22H2 系统本地提权 POChttps://github.com/AiK1d/CVE-2023-21768-POCPOC Details
17Nonehttps://github.com/radoi-teodor/CVE-2023-21768-DSE-BypassPOC Details
18CVE-2023-21768 Windows 11 22H2 系统本地提权 POChttps://github.com/P4x1s/CVE-2023-21768-POCPOC Details
19https://github.com/chompie1337/Windows_LPE_AFD_CVE-2023-21768https://github.com/Feede33/Windows-11-ExploitPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-21768

登录查看更多情报信息。

Same Patch Batch · Microsoft · 2023-01-10 · 98 CVEs total

CVE-2023-217328.8 HIGHMicrosoft ODBC Driver Remote Code Execution Vulnerability
CVE-2023-216748.8 HIGHWindows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability
CVE-2023-216768.8 HIGHWindows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
CVE-2023-217428.8 HIGHMicrosoft SharePoint Server Remote Code Execution Vulnerability
CVE-2023-217448.8 HIGHMicrosoft SharePoint Server Remote Code Execution Vulnerability
CVE-2023-215498.8 HIGHWindows SMB Witness Service Elevation of Privilege Vulnerability
CVE-2023-216818.8 HIGHMicrosoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVE-2023-215468.1 HIGHWindows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability
CVE-2023-215488.1 HIGHWindows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
CVE-2023-215438.1 HIGHWindows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability
CVE-2023-216798.1 HIGHWindows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability
CVE-2023-215558.1 HIGHWindows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability
CVE-2023-215568.1 HIGHWindows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability
CVE-2023-215358.1 HIGHWindows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
CVE-2023-217628.0 HIGHMicrosoft Exchange Server Spoofing Vulnerability
CVE-2023-217458.0 HIGHMicrosoft Exchange Server Spoofing Vulnerability
CVE-2023-217477.8 HIGHWindows Kernel Elevation of Privilege Vulnerability
CVE-2023-217467.8 HIGHWindows NTLM Elevation of Privilege Vulnerability
CVE-2023-216787.8 HIGHWindows Print Spooler Elevation of Privilege Vulnerability
CVE-2023-217377.8 HIGHMicrosoft Office Visio Remote Code Execution Vulnerability

Showing top 20 of 98 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2023-21768

No comments yet


Leave a comment