CVE-2021-1732

Description from NVD

Windows Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-1698.

Information Acquisition Date:2022-02-20T14:54Z
CVSS 2.0: 4.6 MEDIUM CVSS 3.x: 7.8 HIGH

▼ CVSS3 Vec CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

▼ CVSS2 Vec AV:L/AC:L/Au:N/C:P/I:P/A:P

NVD References

 N/A
     source:N/A
     tags:Patch    Vendor Advisory    
 http://packetstormsecurity.com/files/161880/Win32k-ConsoleControl-Offset-Confusion.html
     source:MISC
     tags:Exploit    Third Party Advisory    VDB Entry    

This vulnerability may involve a PoC.

Description from Forti

Microsoft: Windows Win32k Elevation of Privilege Vulnerability

This indicates an attack attempt to exploit an Elevation Of Privilege Vulnerability in Microsoft Windows Win32K.The vulnerability is due to an error in the vulnerable application when handling a maliciously crafted file. A remote attacker may be able to exploit this to leverage their privileges on vulnerable systems.

Information Acquisition Date:2021/03/01

Affected Products

Windows 10 Version 1803 for 32-bit Systems
Windows 10 Version 1803 for ARM64-based Systems
Windows 10 Version 1803 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1909 for 32-bit Systems
Windows 10 Version 1909 for ARM64-based Systems
Windows 10 Version 1909 for x64-based Systems
Windows 10 Version 2004 for 32-bit Systems
Windows 10 Version 2004 for ARM64-based Systems
Windows 10 Version 2004 for x64-based Systems
Windows 10 Version 20H2 for 32-bit Systems
Windows 10 Version 20H2 for ARM64-based Systems
Windows 10 Version 20H2 for x64-based Systems
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows Server, version 1909 (Server Core installation)
Windows Server, version 2004 (Server Core installation)
Windows Server, version 20H2 (Server Core Installation)

Impact

Privilege Escalation: Remote attackers can leverage their privileges on vulnerable systems.

Recommended Actions

Apply the most recent upgrade or patch from the vendor.
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1732

References

Refer to Information on External Sites

CVE InfomationExploits or more Infomation
mitreEXPLOIT DATABASE
NVD0day.today
vulmon.comgithub
CVE DetailsTwitter
JVN ENG JPN
Reconshell

Software Tag:



List of frequently cited URLs

URLNum of Times Referred to
https://git1327
https://alerts.vulmon.com/?utm_source=twitter&utm_medium=so...258
https://cvetrends.com50
https://lists.astaro.com/ASGV9-IPS-rules.html20
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2...11
https://us-cert.cisa.gov/ncas/current-activity/2021/02/09/m...5
https://thehackernews.com/2021/02/microsoft-issues-patches-...4
https://bit.ly/2ZauW5R3
https://github.com/KaLendsi/CVE-2021-1732-Exploit3
https://twitter.com/maddiestone/status/13592038687316131853
https://www.cisa.gov/uscert/ncas/current-activity/2022/02/0...3
https://www.mcafee.com/blogs/enterprise/mcafee-enterprise-a...3
https://www.thezdi.com/blog/2021/2/9/the-february-2022-secu...3
https://iamelli0t.github.io/2021/03/25/CVE-2021-1732.html3
https://perception-point.io/technical-analysis-of-cve-2022-...3
http://feedproxy.google.com/~r/Snort/~3/HHIMfNdIID8/snort-r...3
https://packetstormsecurity.com/files/162982/CVE-2021-1732_...3
https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/w...3
https://www.bleepingcomputer.com/news/microsoft/windows-vul...3
https://googleprojectzero.github.io/0days-in-the-wild//0day...3

Information from Twitter

User URL Info Source Date
zfbi_ https://github.com/Ascotbe/Kernelhub/tree/master/CVE-2021-2... Source zfbi_            1612149519029780481 2023/01/09
zfbi_ https://twitter.com/zfbi_/status/1612149519029780481/video/1 Source zfbi_            1612149519029780481 2023/01/09

List of frequently cited URLs

URLNum of Times Referred to
git1327
alerts.vulmon.com258
cvetrends.com50
lists.astaro.com20
msrc.microsoft.com11
us-cert.cisa.gov5
thehackernews.com4
bit.ly3
github.com3
twitter.com3
www.cisa.gov3
www.mcafee.com3
www.thezdi.com3
iamelli0t.github.io3
perception-point.io3
feedproxy.google.com3
packetstormsecurity.com3
ti.dbappsecurity.com.cn3
www.bleepingcomputer.com3
googleprojectzero.github.io3

Information from Twitter

User URL Info Source
zfbi_ github.com Show Tweet
zfbi_ twitter.com Show Tweet

GitHub Search Results: Up to 10
NameURL
KaLendsi/CVE-2021-1732-Exploit https://github.com/KaLendsi/CVE-2021-1732-Exploit
k-k-k-k-k/CVE-2021-1732 https://github.com/k-k-k-k-k/CVE-2021-1732
Pai-Po/CVE-2021-1732 https://github.com/Pai-Po/CVE-2021-1732
exploitblizzard/Windows-Privilege-Escalation-CVE-2021-1732 https://github.com/exploitblizzard/Windows-Privilege-Escalation-CVE-2021-1732
jessica0f0116/cve_2021_1732 https://github.com/jessica0f0116/cve_2021_1732
oneoy/CVE-2021-1732-Exploit https://github.com/oneoy/CVE-2021-1732-Exploit
linuxdy/CVE-2021-1732_exp https://github.com/linuxdy/CVE-2021-1732_exp
Ascotbe/Kernelhub https://github.com/Ascotbe/Kernelhub
Al1ex/WindowsElevation https://github.com/Al1ex/WindowsElevation
BeneficialCode/CVE-2021-1732 https://github.com/BeneficialCode/CVE-2021-1732

GitHub Search Results: Up to 10
NameURL
KaLendsi/CVE-2021-1732-Exploit github.com
k-k-k-k-k/CVE-2021-1732 github.com
Pai-Po/CVE-2021-1732 github.com
exploitblizzard/Windows-Privilege-Escalation-CVE-2021-1732 github.com
jessica0f0116/cve_2021_1732 github.com
oneoy/CVE-2021-1732-Exploit github.com
linuxdy/CVE-2021-1732_exp github.com
Ascotbe/Kernelhub github.com
Al1ex/WindowsElevation github.com
BeneficialCode/CVE-2021-1732 github.com

2023/02/15 Score : 0
Added Har-sia Database : 2021/02/10
Last Modified : 2023/02/15
Highest Scored Date : 2021/02/10
Highest Score : 58