- Description
- Microsoft Streaming Service Elevation of Privilege Vulnerability
- Source
- secure@microsoft.com
- NVD status
- Modified
CVSS 3.1
- Type
- Secondary
- Base score
- 7
- Impact score
- 5.9
- Exploitability score
- 1
- Vector string
- CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- Hype score
- Not currently trending
CVE-2024-30090 - LPE PoC https://t.co/VIf2pHKN2H
@Dinosn
12 Nov 2024
1162 Impressions
0 Retweets
3 Likes
2 Bookmarks
0 Replies
0 Quotes
GitHub - Dor00tkit/CVE-2024-30090: CVE-2024-30090 - LPE PoC https://t.co/re1BrYNuer
@akaclandestine
21 Oct 2024
1910 Impressions
11 Retweets
37 Likes
12 Bookmarks
1 Reply
0 Quotes
🚨 New Exploit Alert: CVE-2024-30090 - A privilege escalation vulnerability in Windows has been detailed by @Dor00tkit. 🔧 Details: Allows an attacker to elevate privileges to SYSTEM using an arbitrary increment on nt!SeDebugPrivilege. Demonstrates a Local Privilege Escalation…
@IntCyberDigest
21 Oct 2024
59 Impressions
1 Retweet
2 Likes
1 Bookmark
0 Replies
0 Quotes
Windowsの権限昇格脆弱性CVE-2024-30090に対応するPoC(攻撃の概念実証コード)が公開された。CVE-2024-30090はCVSSスコア7.0で、SeDebugPrivilege変更時の競合状態に起因するSYSTEMへの権限昇格。 https://t.co/KEMb4k0znE
@__kokumoto
21 Oct 2024
1737 Impressions
7 Retweets
28 Likes
10 Bookmarks
0 Replies
0 Quotes
Microsoft Windows Flaw: CVE-2024-30090 PoC Exploit Published, Posing SYSTEM Privilege Threat https://t.co/Kux7d9vUSD
@Dinosn
21 Oct 2024
3738 Impressions
16 Retweets
63 Likes
26 Bookmarks
0 Replies
1 Quote
Microsoft Windows Flaw: CVE-2024-30090 PoC Exploit Published, Posing SYSTEM Privilege Threat Following Angelboy's analysis, security researcher Dor00tkit published a proof-of-concept (PoC) exploit code for CVE-2024-30090 on GitHub https://t.co/LFMiHAWBb7
@the_yellow_fall
21 Oct 2024
4852 Impressions
11 Retweets
51 Likes
28 Bookmarks
0 Replies
0 Quotes
#exploit Streaming vulnerabilities from Windows Kernel - Proxying to Kernel Part 1 (CVE-2024-30084, CVE-2024-35250): https://t.co/aQ7z3rFyrV Part 2 (CVE-2024-30090): https://t.co/qcD48Qk9xt ]-> https://t.co/TXaaRcNG71
@airacaaaa
30 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
The exploit for CVE-2024-30090 https://t.co/VIf2pHKN2H
@Dinosn
2015 Impressions
4 Retweets
16 Likes
5 Bookmarks
0 Replies
0 Quotes
💻 Exploiting Windows Kernel via Kernel Streaming Proxying An in-depth look at CVE-2024-30090, a vulnerability in Kernel Streaming. 🔗 Research: Proxying to Kernel - Part I Proxying to Kernel - Part II 🔗 Source: https://t.co/XW0UMMD6D0 #windows #streaming #kernel #cve #poc
@un_exceptional
9 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
#exploit Streaming vulnerabilities from Windows Kernel - Proxying to Kernel Part 1 (CVE-2024-30084, CVE-2024-35250): https://t.co/PCeCq0JWCZ Part 2 (CVE-2024-30090): https://t.co/TjOAfoSNWv ]-> https://t.co/heJDE8ujc3
@ksg93rd
2654 Impressions
13 Retweets
55 Likes
21 Bookmarks
0 Replies
0 Quotes
I implemented a PoC for CVE-2024-30090, which @scwuaptx discovered. The PoC uses an arbitrary increment primitive on nt!SeDebugPrivilege to escalate privileges to SYSTEM. https://t.co/Is4oKsShDF #CVE-2024-30090 #PoC #LPE
@Dor00tkit
12316 Impressions
44 Retweets
130 Likes
68 Bookmarks
0 Replies
2 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "CF7733FD-F870-4578-A567-9900AD6C78E3",
"versionEndExcluding": "10.0.10240.20680"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D96DA51E-404E-49AE-B852-56FF8A1CEEA6",
"versionEndExcluding": "10.0.14393.7070"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9B52F95E-6080-46C6-B4B6-E2B3F3E78456",
"versionEndExcluding": "10.0.17763.5936"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "1CEAF689-E8DB-4D3C-BC2E-B386BC077BC5",
"versionEndExcluding": "10.0.19044.4529"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "970F54FC-F4ED-49B9-BE94-96B7212FD149",
"versionEndExcluding": "10.0.19045.4529"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "84ECD6C0-8C47-4D2F-82B5-4F8C0BBC5FEE",
"versionEndExcluding": "10.0.22000.3019"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "4E80DF17-1F27-474E-B147-9F5B6C494300",
"versionEndExcluding": "10.0.22621.3737"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "4258468C-56CC-45C0-B510-FC833E942876",
"versionEndExcluding": "10.0.22631.3737"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"vulnerable": true,
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "FA61AAF0-D769-4287-AA5C-EFDAD067E9F1",
"versionEndExcluding": "10.0.14393.7070"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "12F9D974-A968-4CBB-81D8-C73B76DD284A",
"versionEndExcluding": "10.0.17763.5936"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "498A643B-0180-4AD3-BD7C-5E3CEB0FD112",
"versionEndExcluding": "10.0.20348.2522"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0EA59E2D-57B2-4E8B-937A-3EB51A3AD285",
"versionEndExcluding": "10.0.25398.950"
}
],
"operator": "OR"
}
]
}
]