{"uuid": "ba36a350-07aa-4a03-b8f4-1f4567ba4e31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30090", "type": "published-proof-of-concept", "source": "https://t.me/paiddpam/5690", "content": "\ud83d\udcbb Exploiting Windows Kernel via Kernel Streaming Proxying\n\nAn in-depth look at CVE-2024-30090, a vulnerability in Kernel Streaming, allowing privilege escalation via malformed IOCTL requests. By leveraging KS Event mishandling during 32-bit to 64-bit conversions, can exploit the bug pattern to gain arbitrary kernel mode access.\n\n\ud83d\udd17 Research:\nProxying to Kernel - Part I\nProxying to Kernel - Part II\n\n\ud83d\udd17 Source:\nhttps://github.com/Dor00tkit/CVE-2024-30090\n\n#windows #streaming #kernel #cve #poc", "creation_timestamp": "2024-10-26T07:01:14.000000Z"}