Windows Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-1698.
This indicates an attack attempt to exploit an Elevation Of Privilege Vulnerability in Microsoft Windows Win32K.The vulnerability is due to an error in the vulnerable application when handling a maliciously crafted file. A remote attacker may be able to exploit this to leverage their privileges on vulnerable systems.
Windows 10 Version 1803 for 32-bit Systems
Windows 10 Version 1803 for ARM64-based Systems
Windows 10 Version 1803 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1909 for 32-bit Systems
Windows 10 Version 1909 for ARM64-based Systems
Windows 10 Version 1909 for x64-based Systems
Windows 10 Version 2004 for 32-bit Systems
Windows 10 Version 2004 for ARM64-based Systems
Windows 10 Version 2004 for x64-based Systems
Windows 10 Version 20H2 for 32-bit Systems
Windows 10 Version 20H2 for ARM64-based Systems
Windows 10 Version 20H2 for x64-based Systems
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows Server, version 1909 (Server Core installation)
Windows Server, version 2004 (Server Core installation)
Windows Server, version 20H2 (Server Core Installation)
Privilege Escalation: Remote attackers can leverage their privileges on vulnerable systems.
Apply the most recent upgrade or patch from the vendor.
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1732
CVE Infomation | Exploits or more Infomation |
---|---|
mitre | EXPLOIT DATABASE |
NVD | 0day.today |
vulmon.com | github |
CVE Details | |
JVN ENG JPN | |
Reconshell |
Software Tag:
List of frequently cited URLs
User | URL | Info Source | Date |
---|---|---|---|
zfbi_ | https://github.com/Ascotbe/Kernelhub/tree/master/CVE-2021-2... | Source zfbi_ 1612149519029780481 | 2023/01/09 |
zfbi_ | https://twitter.com/zfbi_/status/1612149519029780481/video/1 | Source zfbi_ 1612149519029780481 | 2023/01/09 |
List of frequently cited URLs
User | URL | Info Source |
---|---|---|
zfbi_ | github.com | Show Tweet |
zfbi_ | twitter.com | Show Tweet |
Name | URL |
---|---|
KaLendsi/CVE-2021-1732-Exploit | https://github.com/KaLendsi/CVE-2021-1732-Exploit |
k-k-k-k-k/CVE-2021-1732 | https://github.com/k-k-k-k-k/CVE-2021-1732 |
Pai-Po/CVE-2021-1732 | https://github.com/Pai-Po/CVE-2021-1732 |
exploitblizzard/Windows-Privilege-Escalation-CVE-2021-1732 | https://github.com/exploitblizzard/Windows-Privilege-Escalation-CVE-2021-1732 |
jessica0f0116/cve_2021_1732 | https://github.com/jessica0f0116/cve_2021_1732 |
oneoy/CVE-2021-1732-Exploit | https://github.com/oneoy/CVE-2021-1732-Exploit |
linuxdy/CVE-2021-1732_exp | https://github.com/linuxdy/CVE-2021-1732_exp |
Ascotbe/Kernelhub | https://github.com/Ascotbe/Kernelhub |
Al1ex/WindowsElevation | https://github.com/Al1ex/WindowsElevation |
BeneficialCode/CVE-2021-1732 | https://github.com/BeneficialCode/CVE-2021-1732 |
Name | URL |
---|---|
KaLendsi/CVE-2021-1732-Exploit | github.com |
k-k-k-k-k/CVE-2021-1732 | github.com |
Pai-Po/CVE-2021-1732 | github.com |
exploitblizzard/Windows-Privilege-Escalation-CVE-2021-1732 | github.com |
jessica0f0116/cve_2021_1732 | github.com |
oneoy/CVE-2021-1732-Exploit | github.com |
linuxdy/CVE-2021-1732_exp | github.com |
Ascotbe/Kernelhub | github.com |
Al1ex/WindowsElevation | github.com |
BeneficialCode/CVE-2021-1732 | github.com |