{"vulnerability": "CVE-2024-20698", "sightings": [{"uuid": "705f3fb7-95e8-46c6-9dbb-aa06ec70c5fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20698", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/1899", "content": "https://github.com/RomanRybachek/CVE-2024-20698\n#github", "creation_timestamp": "2024-01-25T09:06:57.000000Z"}, {"uuid": "f04d8298-f1b7-4b36-89d2-8aaf6f9b7e9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20698", "type": "seen", "source": "https://t.me/arpsyndicate/3123", "content": "#ExploitObserverAlert\n\nCVE-2024-20698\n\nDESCRIPTION: Exploit Observer has 5 entries in 4 file formats related to CVE-2024-20698. Windows Kernel Elevation of Privilege Vulnerability\n\nFIRST-EPSS: 0.001460000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2024-01-27T23:58:47.000000Z"}, {"uuid": "a83f7599-9642-4875-a19f-86f6d148c5e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20698", "type": "seen", "source": "https://t.me/ctinow/165329", "content": "https://ift.tt/LQb6nzl\nCVE-2024-20698 | Microsoft Windows up to Server 2022 23H2 Kernel Local Privilege Escalation", "creation_timestamp": "2024-01-09T20:16:35.000000Z"}, {"uuid": "86624cdc-37d4-4c35-ba23-986595844475", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20698", "type": "published-proof-of-concept", "source": "Telegram/lR5J4hOt5BrRokgK2u5rcj7gPJxxEngjC1J-5N9HnnVyMQ", "content": "", "creation_timestamp": "2024-01-26T02:00:00.000000Z"}, {"uuid": "287fb32f-07cc-41e9-b2ac-30ed44a08f80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20698", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9846", "content": "#exploit\n1. CVE-2023-45185:\nRCE via insecure deserialisation in IBM i Access Client Solutions &lt; 1.1.9\nhttps://github.com/afine-com/CVE-2023-45185\n\n2. CVE-2023-50445/CVE-2023-50919:\nGL.iNet Unauthenticated RCE\nhttps://packetstormsecurity.com/files/176708/GL.iNet-Unauthenticated-Remote-Command-Execution.html\n\n3. CVE-2024 -20698:\nWindows Kernel EoP\nhttps://github.com/RomanRybachek/CVE-2024-20698", "creation_timestamp": "2024-01-25T12:47:06.000000Z"}, {"uuid": "196c0ab1-a7d1-4731-968c-b40ce6bacb7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20698", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2568", "content": "#exploit\n1. CVE-2023-45185:\nRCE via insecure deserialisation in IBM i Access Client Solutions &lt; 1.1.9\nhttps://github.com/afine-com/CVE-2023-45185\n\n2. CVE-2023-50445/CVE-2023-50919:\nGL.iNet Unauthenticated RCE\nhttps://packetstormsecurity.com/files/176708/GL.iNet-Unauthenticated-Remote-Command-Execution.html\n\n3. CVE-2024-20698:\nWindows Kernel EoP\nhttps://github.com/RomanRybachek/CVE-2024-20698", "creation_timestamp": "2024-08-16T09:02:40.000000Z"}]}