Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-21338 PoC — Windows Kernel Elevation of Privilege Vulnerability

Source
Associated Vulnerability
Title:Windows Kernel Elevation of Privilege Vulnerability (CVE-2024-21338)
Description:Windows Kernel Elevation of Privilege Vulnerability
Description
Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.
Readme
# CVE-2024-21338
Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.

## Compiling
- Use Microsoft Visual Studio with the C++ package to successfully compile the PoC on both `Release` and `Debug` modes.

## Post
Original blog post: https://hakaisecurity.io/cve-2024-21338-from-admin-to-kernel-through-token-manipulation-and-windows-kernel-exploitation/research-blog/
File Snapshot

[4.0K] /data/pocs/91f8718636acf17a12a19fb465dc7aa688723dd5 ├── [2.8K] console.hpp ├── [1.0K] CVE-2024-21338-POC.sln ├── [4.9K] CVE-2024-21338-POC.vcxproj ├── [ 543] CVE-2024-21338-POC.vcxproj.filters ├── [ 10K] impersonate.cpp ├── [ 865] impersonate.hpp ├── [ 34K] LICENSE ├── [ 620] main.cpp ├── [ 18] pch.cpp ├── [ 183] pch.hpp ├── [1.3M] phnt.h ├── [ 12K] poc.cpp ├── [2.1K] poc.hpp └── [ 443] README.md 0 directories, 14 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →