{"vulnerability": "CVE-2024-21338", "sightings": [{"uuid": "962adfce-81b3-434a-942b-d4c1354bc9be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "seen", "source": "MISP/25fa55b8-2e04-477b-b1d4-273701eca07f", "content": "", "creation_timestamp": "2024-09-27T12:12:36.000000Z"}, {"uuid": "8febf994-cdfa-46a2-8e5a-5d50e99b4d8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2024-03-04T18:10:03.000000Z"}, {"uuid": "2ce06137-08c6-4434-9f64-57fa9a0f4f33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:52.000000Z"}, {"uuid": "13e8620d-bb9f-40ea-9d6f-80649f90e8ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3lyzjwke3bk2c", "content": "", "creation_timestamp": "2025-09-17T09:36:37.038648Z"}, {"uuid": "581840a0-a9a3-4203-814e-5eba94b604da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "seen", "source": "https://bsky.app/profile/lazarusholic.bsky.social/post/3lnxfasra2d27", "content": "", "creation_timestamp": "2025-04-29T13:30:25.062641Z"}, {"uuid": "785283b4-ee99-4b35-9de9-139566123764", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-21338", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/fdda4963-0aa7-4d15-8a8f-969db8f304ca", "content": "", "creation_timestamp": "2025-02-28T23:49:13.272798Z"}, {"uuid": "e0e43fb2-c847-4fed-9089-2d337d307ffb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "seen", "source": "MISP/3445a876-cced-4346-bf37-e276ba39cff4", "content": "", "creation_timestamp": "2025-09-02T18:30:14.000000Z"}, {"uuid": "cb5a1388-cc2d-4607-adca-61be2e932526", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-21338", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/84dfe84e-780a-4938-bfb7-9662816cb473", "content": "", "creation_timestamp": "2026-02-02T12:26:40.734105Z"}, {"uuid": "ef7b6b9f-a46f-4172-964f-a6a067b246b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "exploited", "source": "https://t.me/itsec_news/4148", "content": "\u200b\u26a1\ufe0fCVE-2024-21338: \u043a\u0430\u043a Lazarus \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u044b Windows \u0434\u043b\u044f \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u0431\u0435\u0441\u0441\u043c\u0435\u0440\u0442\u043d\u043e\u0433\u043e \u0440\u0443\u0442\u043a\u0438\u0442\u0430\n\n\ud83d\udcac \u0421\u0435\u0432\u0435\u0440\u043e\u043a\u043e\u0440\u0435\u0439\u0441\u043a\u0438\u0435 \u0445\u0430\u043a\u0435\u0440\u044b Lazarus \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 Windows AppLocker \u0434\u043b\u044f \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043d\u0430 \u0443\u0440\u043e\u0432\u043d\u0435 \u044f\u0434\u0440\u0430 \u0438 \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u044f \u0441\u0440\u0435\u0434\u0441\u0442\u0432 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0438\u0437\u0431\u0435\u0436\u0430\u0432 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f.\n\n\u0410\u043d\u0430\u043b\u0438\u0442\u0438\u043a\u0438 Avast \u0432\u044b\u044f\u0432\u0438\u043b\u0438 \u0438 \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0438 \u043e \u0434\u0435\u044f\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u0438 \u0445\u0430\u043a\u0435\u0440\u043e\u0432 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Microsoft, \u0447\u0442\u043e \u043f\u0440\u0438\u0432\u0435\u043b\u043e \u043a \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u044f\u0434\u0440\u0430 Windows, \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0435\u0439 \u043e\u0431\u043e\u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0435 CVE-2024-21338 (\u043e\u0446\u0435\u043d\u043a\u0430 CVSS: 7.8) \u0438 \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u043e\u0439 \u0441 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435\u043c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439. \u041e\u0434\u043d\u0430\u043a\u043e, Microsoft \u043d\u0435 \u043a\u043b\u0430\u0441\u0441\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043b\u0430 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u043a \u043a\u0430\u043a 0day. \u041e\u0448\u0438\u0431\u043a\u0430 \u0431\u044b\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 \u0432 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u043c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0438 Patch Tuesday \u0432 \u0444\u0435\u0432\u0440\u0430\u043b\u0435.\n\n\u0413\u0440\u0443\u043f\u043f\u0430 Lazarus \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430 CVE-2024-21338 \u0434\u043b\u044f \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u043f\u0440\u0438\u043c\u0438\u0442\u0438\u0432\u0430 \u0447\u0442\u0435\u043d\u0438\u044f/\u0437\u0430\u043f\u0438\u0441\u0438 \u0432 \u044f\u0434\u0440\u0435 \u0432 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438 \u0441\u0432\u043e\u0435\u0433\u043e \u0440\u0443\u0442\u043a\u0438\u0442\u0430 FudModule, \u0432\u043f\u0435\u0440\u0432\u044b\u0435 \u0437\u0430\u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e ESET \u0432 \u043a\u043e\u043d\u0446\u0435 2022 \u0433\u043e\u0434\u0430. \u0421\u0442\u043e\u0438\u0442 \u043e\u0442\u043c\u0435\u0442\u0438\u0442\u044c, \u0447\u0442\u043e FudModule \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u043c\u0435\u0442\u043e\u0434 BYOVD (Bring Your Own Vulnerable Driver), \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0445\u0430\u043a\u0435\u0440\u0430\u043c \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432. \u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u043a \u0440\u0430\u0437\u0432\u044f\u0437\u044b\u0432\u0430\u0435\u0442 \u043a\u0438\u0431\u0435\u0440\u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u0438\u043a\u0430\u043c \u0440\u0443\u043a\u0438, \u043e\u0442\u043a\u0440\u044b\u0432\u0430\u044f \u043f\u043e\u043b\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043f\u0430\u043c\u044f\u0442\u0438 \u044f\u0434\u0440\u0430.\n\n\u0412 \u043d\u043e\u0432\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438 FudModule \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u044b \u0437\u043d\u0430\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u0443\u043b\u0443\u0447\u0448\u0435\u043d\u0438\u044f \u043f\u043e \u0441\u043a\u0440\u044b\u0442\u043d\u043e\u0441\u0442\u0438 \u0438 \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u0438, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043d\u043e\u0432\u044b\u0435 \u043c\u0435\u0442\u043e\u0434\u044b \u043e\u0431\u0445\u043e\u0434\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0438 \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u044f \u0437\u0430\u0449\u0438\u0442\u043d\u044b\u0445 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u043e\u0432, \u0442\u0430\u043a\u0438\u0445 \u043a\u0430\u043a Microsoft Defender \u0438 CrowdStrike Falcon.\n\n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, Avast \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0430 \u0440\u0430\u043d\u0435\u0435 \u043d\u0435 \u0437\u0430\u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0442\u0440\u043e\u044f\u043d \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 (Remote Access Trojan, RAT), \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0439 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u043e\u0439, \u043e \u0447\u0435\u043c \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u043e\u0431\u0435\u0449\u0430\u0435\u0442 \u0440\u0430\u0441\u0441\u043a\u0430\u0437\u0430\u0442\u044c \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u0435\u0435 \u043d\u0430 \u043a\u043e\u043d\u0444\u0435\u0440\u0435\u043d\u0446\u0438\u0438 BlackHat Asia \u0432 \u0430\u043f\u0440\u0435\u043b\u0435.\n\n\u041c\u0435\u0442\u043e\u0434 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0432\u043a\u043b\u044e\u0447\u0430\u043b \u043c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0434\u0438\u0441\u043f\u0435\u0442\u0447\u0435\u0440\u043e\u043c \u0432\u0432\u043e\u0434\u0430-\u0432\u044b\u0432\u043e\u0434\u0430 \u0432 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 appid.sys \u0434\u043b\u044f \u0432\u044b\u0437\u043e\u0432\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u0443\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044f, \u0447\u0442\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u043b\u043e \u043e\u0431\u043e\u0439\u0442\u0438 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438. \u0420\u0443\u0442\u043a\u0438\u0442 FudModule \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u043b \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u043f\u0440\u044f\u043c\u043e\u0439 \u043c\u0430\u043d\u0438\u043f\u0443\u043b\u044f\u0446\u0438\u0438 \u043e\u0431\u044a\u0435\u043a\u0442\u0430\u043c\u0438 \u044f\u0434\u0440\u0430 (Direct Kernel Object Manipulation, DKOM) \u0434\u043b\u044f \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0441\u043a\u0440\u044b\u0442\u0438\u044f \u0437\u043b\u043e\u043d\u0430\u043c\u0435\u0440\u0435\u043d\u043d\u044b\u0445 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0439 \u0438 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0443\u0441\u0442\u043e\u0439\u0447\u0438\u0432\u043e\u0441\u0442\u0438 \u043d\u0430 \u0437\u0430\u0440\u0430\u0436\u0435\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435.\n\n\u0421\u0440\u0435\u0434\u0438 \u0446\u0435\u043b\u0435\u0439 \u2013 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 AhnLab V3 Endpoint Security, Windows Defender, CrowdStrike Falcon \u0438 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u043d\u043e\u0435 \u0440\u0435\u0448\u0435\u043d\u0438\u0435 HitmanPro. \u041d\u043e\u0432\u0430\u044f \u0432\u0435\u0440\u0441\u0438\u044f \u0440\u0443\u0442\u043a\u0438\u0442\u0430 \u043e\u0431\u043b\u0430\u0434\u0430\u0435\u0442 \u0444\u0443\u043d\u043a\u0446\u0438\u044f\u043c\u0438 \u0441\u043a\u0440\u044b\u0442\u043d\u043e\u0441\u0442\u0438 \u0438 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u043d\u044b\u043c\u0438 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044f\u043c\u0438, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0441\u043f\u043e\u0441\u043e\u0431\u043d\u043e\u0441\u0442\u044c \u043f\u0440\u0438\u043e\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u0442\u044c \u0437\u0430\u0449\u0438\u0449\u0435\u043d\u043d\u044b\u0435 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u044b, \u0432\u044b\u0431\u043e\u0440\u043e\u0447\u043d\u043e\u0435 \u0438 \u0446\u0435\u043b\u0435\u043d\u0430\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u043e\u0435 \u043d\u0430\u0440\u0443\u0448\u0435\u043d\u0438\u0435 \u0440\u0430\u0431\u043e\u0442\u044b \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0437\u0430\u0449\u0438\u0442\u044b.\n\nAvast \u043f\u043e\u0434\u0447\u0435\u0440\u043a\u0438\u0432\u0430\u0435\u0442, \u0447\u0442\u043e \u043d\u043e\u0432\u0430\u044f \u0442\u0430\u043a\u0442\u0438\u043a\u0430 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0441\u0432\u0438\u0434\u0435\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0443\u0435\u0442 \u043e \u0437\u043d\u0430\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u044d\u0432\u043e\u043b\u044e\u0446\u0438\u0438 \u0441\u043f\u043e\u0441\u043e\u0431\u043d\u043e\u0441\u0442\u0435\u0439 \u0445\u0430\u043a\u0435\u0440\u043e\u0432 \u043a \u0441\u043a\u0440\u044b\u0442\u043d\u044b\u043c \u0430\u0442\u0430\u043a\u0430\u043c \u0438 \u0443\u0434\u0435\u0440\u0436\u0430\u043d\u0438\u044e \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044f \u043d\u0430\u0434 \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u043c\u0438 \u043d\u0430 \u0434\u043b\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0439 \u0441\u0440\u043e\u043a. \u0415\u0434\u0438\u043d\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0439 \u044d\u0444\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u043e\u0439 \u043c\u0435\u0440\u043e\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0441\u0432\u043e\u0435\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e\u0435 \u043f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0432\u0441\u0442\u0440\u043e\u0435\u043d\u043d\u043e\u0433\u043e \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430 Windows \u0434\u0435\u043b\u0430\u0435\u0442 \u0430\u0442\u0430\u043a\u0443 \u043e\u0441\u043e\u0431\u0435\u043d\u043d\u043e \u0441\u043b\u043e\u0436\u043d\u043e\u0439 \u0434\u043b\u044f \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0438 \u043f\u0440\u0435\u0441\u0435\u0447\u0435\u043d\u0438\u044f.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2024-02-29T16:27:22.000000Z"}, {"uuid": "1391eed5-d0cd-4450-bed0-a6da421b1334", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "published-proof-of-concept", "source": "https://t.me/cKure/12738", "content": "\u27a1\ufe0fPoC Exploit Released for zero-day Windows Kernel \nof Privilege Vulnerability (CVE-2024-21338).\n\nhttps://github.com/hakaioffsec/CVE-2024-21338\n\nhttps://hakaisecurity.io/cve-2024-21338-from-admin-to-kernel-through-token-manipulation-and-windows-kernel-exploitation/research-blog/", "creation_timestamp": "2024-04-17T09:06:03.000000Z"}, {"uuid": "80090795-0d06-492a-873d-3359551bd50e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "published-proof-of-concept", "source": "https://t.me/cKure/13011", "content": "\ud83d\udfe5 Zero-Day CVE-2024-21338: Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.\n\nhttps://github.com/hakaioffsec/CVE-2024-21338", "creation_timestamp": "2024-05-31T04:06:35.000000Z"}, {"uuid": "be4a54a8-8023-4977-bb83-c9d81187b173", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7084", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aFork of https://github.com/hakaioffsec/CVE-2024-21338\nURL\uff1ahttps://github.com/UMU618/CVE-2024-21338\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-17T10:19:44.000000Z"}, {"uuid": "a93d616f-3fb4-4105-8128-28109e979c83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6728", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-21338 Windows Kernel Elevation of Privilege Vulnerability\nURL\uff1ahttps://github.com/gogobuster/CVE-2024-21338-POC\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-03-05T18:34:32.000000Z"}, {"uuid": "f0031cb3-4b79-4976-ad47-f219c8786cb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6748", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-21338 Windows Kernel Elevation of Privilege Vulnerability Zero-day\nURL\uff1ahttps://github.com/crackmapEZec/CVE-2024-21338-POC\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-03-07T20:12:57.000000Z"}, {"uuid": "1b49ba03-253d-492c-b74b-997f836124e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "exploited", "source": "https://t.me/kasperskyb2b/1154", "content": "\u27a1\ufe0f \u0414\u0430\u0439\u0434\u0436\u0435\u0441\u0442 APT-\u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0439 \u0438 \u0432\u0430\u0436\u043d\u044b\u0445 \u043d\u043e\u0432\u043e\u0441\u0442\u0435\u0439 \u0418\u0411 \u0437\u0430 \u043d\u0435\u0434\u0435\u043b\u044e:\n\n\ud83d\udc40 \u041f\u043e\u0434\u0440\u043e\u0431\u043d\u044b\u0439 \u0440\u0430\u0437\u0431\u043e\u0440 \u043d\u043e\u0432\u044b\u0445 \u0441\u043b\u043e\u0436\u043d\u044b\u0445 \u0440\u0443\u0442\u043a\u0438\u0442-\u0442\u0435\u0445\u043d\u0438\u043a Lazarus Group: \u043e\u043d\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0438 \u043d\u0435\u0434\u0430\u0432\u043d\u043e \u0437\u0430\u043a\u0440\u044b\u0442\u0443\u044e \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 Patch Tuesday CVE-2024-21338 (EOP \u0447\u0435\u0440\u0435\u0437 AppLocker) \u043a\u0430\u043a \u0437\u0438\u0440\u043e\u0434\u0435\u0439, \u043f\u043e\u0434\u043d\u0438\u043c\u0430\u043b\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0434\u043e system \u0447\u0442\u043e\u0431\u044b \u043e\u0442\u043a\u043b\u044e\u0447\u0430\u0442\u044c \u0421\u0417\u0418, \u0438 \u0440\u0430\u0437\u0432\u043e\u0440\u0430\u0447\u0438\u0432\u0430\u043b\u0438 \u0441\u043e\u0432\u0435\u0440\u0448\u0435\u043d\u043d\u043e \u043d\u043e\u0432\u044b\u0439 \u0442\u0440\u043e\u044f\u043d\u0435\u0446, \u0434\u0435\u0442\u0430\u043b\u0438 \u043e \u043a\u043e\u0442\u043e\u0440\u043e\u043c \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043e\u0431\u0435\u0449\u0430\u044e\u0442 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u044c \u043f\u043e\u0437\u0434\u043d\u0435\u0435. \u0423\u0447\u0438\u0442\u044b\u0432\u0430\u044f, \u0447\u0442\u043e \u0440\u0430\u043d\u044c\u0448\u0435 Lazarus \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0438\u0432\u0430\u043b\u0438\u0441\u044c BYOVD, \u044d\u0442\u043e \u0431\u0435\u0437\u0443\u0441\u043b\u043e\u0432\u043d\u043e \u0437\u043d\u0430\u043c\u0435\u043d\u0443\u0435\u0442 \u043d\u043e\u0432\u044b\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0441\u043b\u043e\u0436\u043d\u043e\u0441\u0442\u0438 \u0432\u043e \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u0438\u0437\u0434\u0435\u043b\u0438\u044f\u0445 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0438.\n\n\u2708\ufe0f \u041d\u043e\u0432\u044b\u0435 \u043a\u0438\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0438 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0438 Mystic Werewolf: \u0442\u0435\u043f\u0435\u0440\u044c, \u043f\u043e \u0441\u043b\u043e\u0432\u0430\u043c \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439, \u043e\u043d\u0430 \u043d\u0430\u0446\u0435\u043b\u0438\u043b\u0430\u0441\u044c \u043d\u0430 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u0412\u041f\u041a. \u041d\u0430\u0447\u0430\u043b\u043e \u0430\u0442\u0430\u043a\u0438 \u043f\u043e-\u043f\u0440\u0435\u0436\u043d\u0435\u043c\u0443 \u043e\u0441\u043d\u043e\u0432\u0430\u043d\u043e \u043d\u0430 \u0444\u0438\u0448\u0438\u043d\u0433\u0435 \u0438 CVE\u20112023\u201138831 \u0432 WinRAR, \u0430 \u0432\u043e\u0442 \u0434\u0430\u043b\u044c\u0448\u0435 \u0432 \u0446\u0435\u043f\u043e\u0447\u043a\u0435 \u0437\u0430\u0440\u0430\u0436\u0435\u043d\u0438\u044f \u043f\u043e\u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043d\u043e\u0432\u044b\u0439 \u0431\u044d\u043a\u0434\u043e\u0440, \u043d\u0430\u0437\u0432\u0430\u043d\u043d\u044b\u0439 \u0430\u0432\u0442\u043e\u0440\u0430\u043c\u0438 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044f Ringspy. \u0412 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u04212 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0442\u0435\u043b\u0435\u0433\u0440\u0430\u043c-\u0431\u043e\u0442.\n\n\ud83e\udd16 \u0412\u041f\u041e \u0432 \u043c\u043e\u0434\u0435\u043b\u044f\u0445 \u043c\u0430\u0448\u0438\u043d\u043d\u043e\u0433\u043e \u043e\u0431\u0443\u0447\u0435\u043d\u0438\u044f: \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u044b JFrog \u043d\u0430\u0448\u043b\u0438 \u0432 \u043a\u0440\u0443\u043f\u043d\u0435\u0439\u0448\u0435\u043c \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u043c \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u0438 ML-\u043c\u043e\u0434\u0435\u043b\u0435\u0439, HuggingFace, \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u0443\u044e \u043c\u043e\u0434\u0435\u043b\u044c, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u0440\u0438 \u0437\u0430\u043f\u0443\u0441\u043a\u0435 \u043f\u043e\u0434\u043d\u0438\u043c\u0430\u0435\u0442 \u0440\u0435\u0432\u0435\u0440\u0441-\u0448\u0435\u043b\u043b \u043d\u0430 \u0437\u0430\u0440\u0430\u0436\u0451\u043d\u043d\u043e\u0439 \u043c\u0430\u0448\u0438\u043d\u0435. \u041f\u043e \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u043c \u043f\u0440\u0438\u0437\u043d\u0430\u043a\u0430\u043c, \u0430\u0442\u0430\u043a\u0430 \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u044d\u043a\u0441\u043f\u0435\u0440\u0438\u043c\u0435\u043d\u0442\u0430\u043b\u044c\u043d\u043e\u0439, \u043d\u043e \u0432 \u0442\u043e\u043c, \u0447\u0442\u043e \u0441\u043b\u0435\u0434\u043e\u043c \u043f\u043e\u044f\u0432\u044f\u0442\u0441\u044f \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0438\u0435 \u043a\u0438\u0431\u0435\u0440\u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u0438\u043a\u0438, \u043e\u0441\u043e\u0431\u044b\u0445 \u0441\u043e\u043c\u043d\u0435\u043d\u0438\u0439 \u043d\u0435\u0442. \u0410\u0442\u0430\u043a\u0430 \u043e\u0441\u043d\u043e\u0432\u0430\u043d\u0430 \u043d\u0430 \u0442\u043e\u043c, \u0447\u0442\u043e \u0432 \u0440\u044f\u0434\u0435 \u043c\u043e\u0434\u0435\u043b\u0435\u0439 \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u0442\u0441\u044f \u0438\u0441\u043f\u043e\u043b\u043d\u0438\u043c\u044b\u0439 \u043a\u043e\u0434 (\u0432 \u0434\u0430\u043d\u043d\u043e\u043c \u0441\u043b\u0443\u0447\u0430\u0435 pickle, \u0444\u043e\u0440\u043c\u0430\u0442 \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u043e\u0431\u044a\u0435\u043a\u0442\u043e\u0432 \u0432 Python). HuggingFace \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u0435\u0442 \u043f\u0440\u0438 \u0441\u043a\u0430\u0447\u0438\u0432\u0430\u043d\u0438\u0438 \u0438 \u0437\u0430\u043f\u0443\u0441\u043a\u0435 \u0442\u0430\u043a\u0438\u0445 \u043c\u043e\u0434\u0435\u043b\u0435\u0439, \u043d\u043e \u043d\u0435 \u0431\u043b\u043e\u043a\u0438\u0440\u0443\u0435\u0442 \u0438\u0445. \u041a\u0440\u043e\u043c\u0435 \u043c\u043e\u0434\u0435\u043b\u0435\u0439, \u043f\u043e\u0434 \u043a\u0430\u043f\u043e\u0442\u043e\u043c \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0435\u0441\u0442\u044c Python (\u043e\u0431\u044b\u0447\u043d\u043e \u043d\u0430 \u0431\u0430\u0437\u0435 PyTorch), \u0440\u0438\u0441\u043a\u0438 \u0435\u0441\u0442\u044c \u043f\u0440\u0438 \u0437\u0430\u043f\u0443\u0441\u043a\u0435  \u043c\u043e\u0434\u0435\u043b\u0435\u0439 \u043d\u0430 Tensorflow Keras. \u0412\u043f\u0440\u043e\u0447\u0435\u043c, \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u043e \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u0445 \u043c\u043e\u0434\u0435\u043b\u0435\u0439 \u043d\u0430 HuggingFace \u0445\u0440\u0430\u043d\u0438\u0442\u0441\u044f \u0432 \u0444\u043e\u0440\u043c\u0430\u0442\u0435 safetensor, \u0433\u0434\u0435 \u043d\u0435\u0442 \u0438\u0441\u043f\u043e\u043b\u043d\u0438\u043c\u043e\u0433\u043e \u043a\u043e\u0434\u0430.\n\n\ud83e\udd2f \u041e\u0433\u0440\u043e\u043c\u043d\u044b\u0445 \u043c\u0430\u0441\u0448\u0442\u0430\u0431\u043e\u0432 \u0430\u0442\u0430\u043a\u0430 \u043d\u0430 GitHub: \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043c\u0430\u0441\u0441\u043e\u0432\u043e \u0441\u043e\u0437\u0434\u0430\u044e\u0442 \u0444\u043e\u0440\u043a\u0438 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u0445 \u043f\u0430\u043a\u0435\u0442\u043e\u0432 \u0438 \u0432\u043d\u043e\u0441\u044f\u0442 \u0432 \u043d\u0438\u0445 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u043a\u043e\u0434 (\u0432 \u043e\u0441\u043d\u043e\u0432\u043d\u043e\u043c \u043c\u043e\u0434\u044b \u0438\u043d\u0444\u043e\u0441\u0442\u0438\u043b\u0435\u0440\u0430 BlackCap-Grabber). \u0417\u0430\u0433\u043e\u043b\u043e\u0432\u043e\u043a \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044f \u0433\u043e\u0432\u043e\u0440\u0438\u0442 \u043e \u0441\u0442\u0430 \u0442\u044b\u0441\u044f\u0447\u0430\u0445 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u0440\u0435\u043f\u043e, \u043d\u043e \u044d\u0442\u043e \u043d\u0435 \u043e\u0442\u0440\u0430\u0436\u0430\u0435\u0442 \u0434\u0438\u043d\u0430\u043c\u0438\u043a\u0438: \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0433\u0435\u043d\u0435\u0440\u0438\u0440\u0443\u044e\u0442 \u043c\u0438\u043b\u043b\u0438\u043e\u043d\u044b \u0440\u0435\u043f\u043e, GitHub \u0443\u0434\u0430\u043b\u044f\u0435\u0442 \u043b\u044c\u0432\u0438\u043d\u0443\u044e \u0434\u043e\u043b\u044e \u044d\u0442\u043e\u0439 \u0434\u0440\u044f\u043d\u0438 \u0432 \u0442\u0435\u0447\u0435\u043d\u0438\u0435 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u0438\u0445 \u0447\u0430\u0441\u043e\u0432, \u043d\u043e \u043a\u0430\u043a\u043e\u0439-\u0442\u043e \u043f\u0440\u043e\u0446\u0435\u043d\u0442 \u043e\u0441\u0442\u0430\u0451\u0442\u0441\u044f. \u0412 \u043e\u0431\u0449\u0435\u043c, opensource-\u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u0438 \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u044e\u0442 \u043f\u0440\u0435\u0432\u0440\u0430\u0449\u0430\u0442\u044c\u0441\u044f \u0432 \u043c\u0438\u043d\u043d\u043e\u0435 \u043f\u043e\u043b\u0435.\n\n\ud83d\udc6e\u200d\u2640\ufe0f \u0418\u043d\u043e\u0433\u0434\u0430 \u0427\u0430\u0441\u0442\u043e \u043e\u043d\u0438 \u0432\u043e\u0437\u0432\u0440\u0430\u0449\u0430\u044e\u0442\u0441\u044f \u2014 \u043a\u0440\u0443\u043f\u043d\u044b\u0435 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0438 ransomware \u0432 \u0442\u043e\u0439 \u0438\u043b\u0438 \u0438\u043d\u043e\u0439 \u0444\u043e\u0440\u043c\u0435 \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u044e\u0442 \u0440\u0430\u0431\u043e\u0442\u0443 \u043f\u043e\u0441\u043b\u0435 \u043f\u043e\u043b\u0438\u0446\u0435\u0439\u0441\u043a\u0438\u0445 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0439. \u0412\u043e\u0442 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0430 AlphV \u0441\u043d\u043e\u0432\u0430 \u0448\u0438\u0444\u0440\u0443\u0435\u0442 \u0436\u0435\u0440\u0442\u0432 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0432\u0435\u0440\u0441\u0438\u0438 2.0 \u0441\u0432\u043e\u0435\u0433\u043e \u0412\u041f\u041e, \u0440\u0430\u0431\u043e\u0442\u0430\u044e\u0449\u0435\u0433\u043e \u043d\u0430 Windows, Linux \u0438 VMWare.\n\n\ud83c\udf10 \u0414\u043e\u0432\u043e\u043b\u044c\u043d\u043e \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u0430\u044f \u0430\u0442\u0430\u043a\u0430 \u043d\u0430 \u0442\u0435\u043b\u0435\u043a\u043e\u043c-\u043e\u043f\u0435\u0440\u0430\u0442\u043e\u0440\u043e\u0432: \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u0431\u044d\u043a\u0434\u043e\u0440 GTPDOOR, \u043d\u0430\u0437\u0432\u0430\u043d\u043d\u044b\u0439 \u0442\u0430\u043a, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u043e\u043d \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0441\u043f\u0435\u0446\u0438\u043b\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b GPRS Tunnnelling Protocol \u0434\u043b\u044f \u0438\u0437\u0432\u043b\u0435\u0447\u0435\u043d\u0438\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0438\u0437 \u0430\u0442\u0430\u043a\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u0441\u0435\u0442\u0438.\n\n\ud83d\udd75\ufe0f\u200d\u2642\ufe0f \u0410\u0442\u0430\u043a\u0430 \u043d\u043e\u0432\u043e\u0439 APT Spikedwine \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u0430 \u043d\u0430 \u0434\u0438\u043f\u043b\u043e\u043c\u0430\u0442\u043e\u0432 \u0438\u0437 \u0415\u0432\u0440\u043e\u043f\u044b \u0438 \u0418\u043d\u0434\u0438\u0438. \u0410\u0432\u0442\u043e\u0440\u044b \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044f \u0441\u0447\u0438\u0442\u0430\u044e\u0442, \u0447\u0442\u043e \u0446\u0435\u043b\u044c\u044e \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0448\u043f\u0438\u043e\u043d\u0430\u0436. \u0412\u0435\u043a\u0442\u043e\u0440\u043e\u043c \u043d\u0430\u0447\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u043d\u0438\u043a\u043d\u043e\u0432\u0435\u043d\u0438\u044f \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0444\u0438\u0448\u0438\u043d\u0433, \u0432 \u0438\u0442\u043e\u0433\u0435 \u0443 \u0436\u0435\u0440\u0442\u0432 \u0440\u0430\u0437\u0432\u043e\u0440\u0430\u0447\u0438\u0432\u0430\u044e\u0442 \u0431\u044d\u043a\u0434\u043e\u0440 Wineloader.\n\n\ud83d\udcc6 29 \u0444\u0435\u0432\u0440\u0430\u043b\u044f, \u043f\u043e\u0440\u0430\u0437\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u043c \u043e\u0431\u0440\u0430\u0437\u043e\u043c, \u043f\u0440\u0438\u0432\u0435\u043b\u043e \u043a \u043c\u043d\u043e\u0433\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u044b\u043c \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430\u043c \u0432 \u0418\u0422-\u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u0445: \u0441\u0431\u043e\u0438\u043b\u0438 \u041f\u041e \u043a\u0430\u0440\u0442\u043e\u0447\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0438\u043d\u0433\u0430 \u0432 \u041d\u043e\u0432\u043e\u0439 \u0417\u0435\u043b\u0430\u043d\u0434\u0438\u0438 \u0438 \u0432 \u0428\u0432\u0435\u0446\u0438\u0438, EPP \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0441\u0442\u0432\u0430 Sophos, \u0430 \u0442\u0430\u043a\u0436\u0435 Citrix VDA.  \u041e\u0431\u044b\u0447\u043d\u044b\u0439 \u0432\u0438\u0441\u043e\u043a\u043e\u0441\u043d\u044b\u0439 \u0433\u043e\u0434, \u043d\u0438\u043a\u0430\u043a\u043e\u0439 \u0442\u0435\u0431\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b-2000 \u0438\u043b\u0438 2038. \u0420\u0435\u0434\u0430\u043a\u0446\u0438\u044f \u0432 \u0448\u043e\u043a\u0435, \u0447\u0435\u0441\u0442\u043d\u043e \u0433\u043e\u0432\u043e\u0440\u044f. \u041e \u043a\u0430\u043a\u0438\u0445 \u043f\u0440\u0430\u043a\u0442\u0438\u043a\u0430\u0445 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u043c\u044b \u0432\u043e\u043e\u0431\u0449\u0435 \u0433\u043e\u0432\u043e\u0440\u0438\u043c, \u043a\u043e\u0433\u0434\u0430 \u0442\u0430\u043a\u0438\u0435 \u0431\u0430\u0437\u043e\u0432\u044b\u0435 \u0432\u0435\u0449\u0438 \u0443\u043c\u0443\u0434\u0440\u044f\u044e\u0442\u0441\u044f \u043d\u0435 \u0434\u043e\u0434\u0435\u043b\u0430\u0442\u044c. \n\n\ud83e\uddf8 \u0423\u0432\u043b\u0435\u043a\u0430\u0442\u0435\u043b\u044c\u043d\u0430\u044f \u0441\u043a\u0430\u0437\u043a\u0430 \u043f\u0440\u043e IoT \u043d\u0430 \u043d\u043e\u0447\u044c: \u0443\u043c\u043d\u044b\u0439 \u0440\u043e\u0431\u043e\u0442-\u043d\u044f\u043d\u044f (\u0433\u0440\u0443\u0431\u043e \u0433\u043e\u0432\u043e\u0440\u044f. Android-\u043f\u043b\u0430\u043d\u0448\u0435\u0442 \u043d\u0430 \u043a\u043e\u043b\u0451\u0441\u0430\u0445) \u0438\u043c\u0435\u043b \u043f\u043e\u043b\u043d\u044b\u0439 \u043a\u043e\u043c\u043f\u043b\u0435\u043a\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043a\u0430\u043a \u0432 \u0441\u0435\u0440\u0432\u0435\u0440\u043d\u044b\u0445 API, \u0442\u0430\u043a \u0438 \u043d\u0430 \u0441\u0442\u043e\u0440\u043e\u043d\u0435 \u0441\u0430\u043c\u043e\u0433\u043e \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430: \u043a \u0443\u0441\u043b\u0443\u0433\u0430\u043c \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0435\u0433\u043e \u0431\u044b\u043b\u0438 \u0437\u0430\u043f\u0443\u0441\u043a \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u043d\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0435, \u0437\u0432\u043e\u043d\u043a\u0438 \u043d\u0430 \u0440\u043e\u0431\u043e\u0442\u0430 \u043e\u0442 \u043f\u043e\u0441\u0442\u043e\u0440\u043e\u043d\u043d\u0438\u043a, \u043f\u0435\u0440\u0435\u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0430\u0446\u0438\u044f \u0440\u043e\u0434\u0438\u0442\u0435\u043b\u044c\u0441\u043a\u043e\u0433\u043e \u0430\u043a\u043a\u0430\u0443\u043d\u0442\u0430 \u043d\u0430 \u0434\u0440\u0443\u0433\u043e\u0433\u043e \u0447\u0435\u043b\u043e\u0432\u0435\u043a\u0430.  \u041d\u043e \u043a\u043e\u043d\u0435\u0446, \u043a\u0430\u043a \u0438 \u043f\u043e\u043b\u043e\u0436\u0435\u043d\u043e \u0432 \u0441\u043a\u0430\u0437\u043a\u0430\u0445, \u0445\u043e\u0440\u043e\u0448\u0438\u0439 \u2014 \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u044b Kaspersky \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0438 \u043e\u0431\u043e \u0432\u0441\u0435\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u0445 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044e \u0438 \u043e\u043d \u0438\u0445 \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b.\n\n#\u0434\u0430\u0439\u0434\u0436\u0435\u0441\u0442 @\u041f2\u0422", "creation_timestamp": "2024-03-04T16:33:21.000000Z"}, {"uuid": "486bee9f-5bf3-4cf9-86f3-c2d848081072", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "exploited", "source": "https://t.me/ap_security/646", "content": "#tools #pentest\n\n \ud83d\udcce PoC CVE-2024-21338\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2024-21338 \u0431\u044b\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u0430\u043c\u0438 Avast \u0432 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 appid.sys Windows AppLocker, \u043e \u0447\u0435\u043c \u043e\u043d\u0438 \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0438 Microsoft \u0432 \u0430\u0432\u0433\u0443\u0441\u0442\u0435 \u043f\u0440\u043e\u0448\u043b\u043e\u0433\u043e \u0433\u043e\u0434\u0430, \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0434\u0438\u0432, \u0447\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0436\u0435  \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044e\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438.\n\n\ud83d\udfe1\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u0435\u0435 \u043e\u0431 \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0430\u043f\u0438\u0441\u0430\u043d\u043e \u0432 \u0441\u0442\u0430\u0442\u044c\u0435 \u043d\u0430 \u0425\u0430\u043a\u0435\u0440.", "creation_timestamp": "2024-08-07T05:44:25.000000Z"}, {"uuid": "eb2ed9cf-e7f4-44a4-a74e-e78315c87bd1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/3303", "content": "CVE-2024-21338\n\nLocal Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.", "creation_timestamp": "2024-09-07T17:06:29.000000Z"}, {"uuid": "dc174de5-7206-4a5f-b569-5f734a25b65b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/581", "content": "CVE-2024-21338\n\nLocal Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.", "creation_timestamp": "2024-09-07T17:06:30.000000Z"}, {"uuid": "c9757eaa-87e7-4df1-a2bf-9f33b251bf4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "published-proof-of-concept", "source": "https://t.me/hydral0gs/2447", "content": "CVE-2024-21338\n\nLPE from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.\n\nBlog: https://hakaisecurity.io/cve-2024-21338-from-admin-to-kernel-through-token-manipulation-and-windows-kernel-exploitation/research-blog/", "creation_timestamp": "2024-04-16T08:55:21.000000Z"}, {"uuid": "dcc484bd-6355-4e28-b092-a447c8c0c51c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "seen", "source": "Telegram/cMcKgZJzKHMQhEe4xkF_FD3bhMhVpBN_fvSnA9-JKLmstsM", "content": "", "creation_timestamp": "2024-03-06T13:03:58.000000Z"}, {"uuid": "c920d555-e8d3-4034-92bf-b3cef40f51d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "published-proof-of-concept", "source": "https://t.me/scorpionisready/453", "content": "CVE-2024-21338\n\nLocal Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.", "creation_timestamp": "2024-09-07T19:29:58.000000Z"}, {"uuid": "71e8e9fe-bf25-454a-8db7-f7af05f5acfe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "published-proof-of-concept", "source": "Telegram/3ovFfKjJz4UK8ANGfWuPcpeCoQJhfiAy29K1Alz1JFDWhQAX", "content": "", "creation_timestamp": "2024-05-13T05:38:45.000000Z"}, {"uuid": "875a5616-528a-4b47-8e99-53894819ea8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "published-proof-of-concept", "source": "Telegram/8lpt_anZJHO7qNKDL5-KTqsPUEqwK7xG4dNT7KfwIY_sQQ", "content": "", "creation_timestamp": "2024-08-10T05:25:04.000000Z"}, {"uuid": "ee04308b-65da-4785-8d33-1c1d025afe1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "published-proof-of-concept", "source": "Telegram/0jVMKATjiGAku6grHmaqwsuveKOQVcQKw9Jyvw2-tTT7sQ", "content": "", "creation_timestamp": "2024-08-06T00:35:46.000000Z"}, {"uuid": "609f116f-228a-4222-b869-57339a9138d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "published-proof-of-concept", "source": "https://t.me/VENOMOUS7t1/3561", "content": "CVE-2024-21338\n\nLocal Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.\nNot tested", "creation_timestamp": "2024-08-11T13:11:28.000000Z"}, {"uuid": "43deec9d-5d6b-4da0-8c27-1d63ac80aafb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "published-proof-of-concept", "source": "https://t.me/openSource3/116", "content": "CVE ID : CVE-2024-21338\nSystem : windows OS 11/10\nType :  Kernel Elevation Privilege\n\n Exploit :\n\n \ud83d\udd3a Github \ud83d\udd3a\n\n\u0627\u0644\u0627\u0633\u062a\u063a\u0644\u0627\u0644 :\n\ud83d\udd3a Github \ud83d\udd3a", "creation_timestamp": "2024-05-16T22:37:06.000000Z"}, {"uuid": "8d37c38a-1cc7-4565-b41f-bbb20bb07814", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "published-proof-of-concept", "source": "https://t.me/openSource3/81", "content": "CVE ID : CVE-2024-21338\nSystem : windows 10, 11\nType : prvilage esclation\n\nExploit :\n\nIn the file \ud83d\udc46\n\n#\u0627\u0633\u062a\u063a\u0644\u0627\u0644_\u062b\u063a\u0631\u0629", "creation_timestamp": "2024-04-21T15:03:14.000000Z"}, {"uuid": "3768e2bb-c60a-4563-b2ed-23bfaee889bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "published-proof-of-concept", "source": "https://t.me/openSource3/80", "content": "CVE : CVE-2024-21338\n\n\u0627\u0644\u0646\u0636\u0627\u0645 \u0627\u0644\u0645\u0635\u0627\u0628 : \u0648\u0646\u062f\u0648\u0632 10\u060c 11\n\u0646\u0648\u0639 \u0627\u0644\u062b\u063a\u0631\u0629 : \u062a\u0635\u0639\u064a\u062f \u0627\u0644\u0635\u0644\u0627\u062d\u064a\u0627\u062a\n\n\u0627\u0644\u0627\u0633\u063a\u0644\u0627\u0644 :\n\u0641\u064a \u0627\u0644\u0645\u0644\u0641 \ud83d\udc46\n\n\u0634\u0643\u0631\u0627 \u062e\u0627\u0635 \u0644\u0644\u0627\u062e baron zero \u0633\u0627\u0639\u062f\u0646\u064a \u0628\u0627\u0644\u0628\u062d\u062b", "creation_timestamp": "2024-05-29T11:49:18.000000Z"}, {"uuid": "d99866ea-cd6d-4a4c-9ac8-248a30772848", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "exploited", "source": "Telegram/ChWIhK29NLpDAudzKl6w1DsJ_9CwSc9hn0M_8LuT05Hm4Q", "content": "", "creation_timestamp": "2024-02-29T17:32:26.000000Z"}, {"uuid": "7a0f14aa-a531-4fc2-ad2e-4dba0ca0bba1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "seen", "source": "https://t.me/CyberDilara/266", "content": "Top 5 Trending CVEs:\n\n    1 - CVE-2024-5806\n    2 - CVE-2024-34102\n    3 - CVE-2024-23958\n    4 - CVE-2024-37032\n    5 - CVE-2024-21338\n\n#cve #cvetrends #cveshield #cybersecurity", "creation_timestamp": "2024-06-27T02:35:30.000000Z"}, {"uuid": "751e7e8d-d566-4ce0-b570-ca8255634e10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "published-proof-of-concept", "source": "https://t.me/dc_main/6213", "content": "CVE-2024-21338\n\nLocal Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.", "creation_timestamp": "2024-07-27T15:47:49.000000Z"}, {"uuid": "0590ae48-3951-450f-8ee6-c967eb49735c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "published-proof-of-concept", "source": "Telegram/DpL8VeBcrXqB8FQsQO-RX5mPbq2NGrzhgrXjGz5Dyn3ZI0A", "content": "", "creation_timestamp": "2024-09-11T07:07:35.000000Z"}, {"uuid": "b926046c-9a9b-4c44-bdf2-86721b4af518", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "published-proof-of-concept", "source": "Telegram/IjGB2LKe2_RAdTdAIsebxaxvsUO3YuCX0Clk5dBjQrHnGQ4", "content": "", "creation_timestamp": "2024-08-10T05:24:10.000000Z"}, {"uuid": "85bd2294-0944-49e1-986a-3beb30281021", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/582", "content": "Windows AppLocker Driver LPE Vulnerability \u2013 CVE-2024-21338 \n\nPoC : 1 \u2013 Abusing PreviousMode :", "creation_timestamp": "2024-08-03T10:57:41.000000Z"}, {"uuid": "d571a934-1ccf-4b30-886e-13a61c451390", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "published-proof-of-concept", "source": "Telegram/W2LIj9tI78Q5VYiIikzjDLoaA7vNQNkSiJ5mjt23_hiHZSQ", "content": "", "creation_timestamp": "2024-07-29T09:01:58.000000Z"}, {"uuid": "752908bc-f3ba-4a5a-a222-ce64b59198b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "published-proof-of-concept", "source": "Telegram/lR-OQFZCOaJILMkesc8sYUyUAJcsd4xZy5YLmMBTdlmc96Q", "content": "", "creation_timestamp": "2025-01-12T10:00:05.000000Z"}, {"uuid": "208f65ac-b13e-4aa0-915e-f44dce6efc89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "exploited", "source": "https://t.me/KomunitiSiber/1569", "content": "Lazarus Hackers Exploited Windows Kernel Flaw as Zero-Day in Recent Attacks\nhttps://thehackernews.com/2024/02/lazarus-hackers-exploited-windows.html\n\nThe notorious Lazarus Group actors exploited a recently patched privilege escalation flaw in the Windows Kernel as a zero-day to obtain kernel-level access and disable security software on compromised hosts.\nThe vulnerability in question is\u00a0CVE-2024-21338\u00a0(CVSS score: 7.8), which can permit an attacker to gain SYSTEM privileges. It was resolved by Microsoft earlier this month as part", "creation_timestamp": "2024-02-29T14:23:05.000000Z"}, {"uuid": "0a13c163-08af-4d63-973b-8ef6aa628fa6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "seen", "source": "https://t.me/dilagrafie/3600", "content": "\u26a1Windows AppLocker Driver LPE Vulnerability - CVE-2024-21338.\n\n#CyberBulletin", "creation_timestamp": "2024-08-02T14:50:29.000000Z"}, {"uuid": "6cab24e2-e339-4777-a258-ba2f9ebd2704", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "seen", "source": "https://t.me/GrayHatsHack/8460", "content": "\u26a1Windows AppLocker Driver LPE Vulnerability - CVE-2024-21338.\n\n#CyberBulletin", "creation_timestamp": "2024-08-02T16:44:49.000000Z"}, {"uuid": "c3aaebb5-2651-4db8-b472-e43d323c1913", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "published-proof-of-concept", "source": "https://t.me/RalfHackerChannel/1478", "content": "CVE-2024-21338: Windows Admin-to-Kernel LPE\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u044b Windows 10 &amp; 11\n\nPoC: https://github.com/hakaioffsec/CVE-2024-21338\n\nBlog: https://hakaisecurity.io/cve-2024-21338-from-admin-to-kernel-through-token-manipulation-and-windows-kernel-exploitation/research-blog/\n\n#lpe #windows #exploit #redteam", "creation_timestamp": "2024-04-16T08:46:00.000000Z"}, {"uuid": "78f78c2f-d21e-49c1-a914-40cf430939a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "seen", "source": "https://t.me/proxy_bar/1928", "content": "CVE-2024-21338\n*\n\u0413\u043e\u0434\u043d\u0430\u044f \u0441\u0442\u0430\u0442\u044c\u044f\nLazarus \u0438 \u0440\u0443\u0442\u043a\u0438\u0442 FudModule: \u0437\u0430 \u043f\u0440\u0435\u0434\u0435\u043b\u0430\u043c\u0438 BYOVD \u0441 \u043d\u0443\u043b\u0435\u0432\u044b\u043c \u0434\u043d\u0435\u043c \u200b\u200b\u043e\u0442 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 \u0434\u043e \u044f\u0434\u0440\u0430\n*", "creation_timestamp": "2024-03-05T14:52:18.000000Z"}, {"uuid": "16d78909-b4a7-44eb-b348-8e965d0b549e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "seen", "source": "https://t.me/GrayHatsHack/7147", "content": "\u26a1Windows AppLocker Driver LPE Vulnerability - CVE-2024-21338.\n\n#CyberBulletin", "creation_timestamp": "2024-08-02T16:44:49.000000Z"}, {"uuid": "6c916b9a-5570-4134-ba61-57f9a82ca292", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "published-proof-of-concept", "source": "Telegram/wST8NEllJb4f6mISLSwACAPoorTi8houjMzBpW0zyh9xigU", "content": "", "creation_timestamp": "2024-04-18T19:39:26.000000Z"}, {"uuid": "a1e0c453-34ee-4d82-b865-3b55506b4ccd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "published-proof-of-concept", "source": "Telegram/J6tmVKFQ719Hwa6ctsz1xRs7COudA7ZCazL8I2eLckBLj-w", "content": "", "creation_timestamp": "2024-05-24T10:58:06.000000Z"}, {"uuid": "3968b070-1fb3-4567-8b0b-acb14d0fcff1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "seen", "source": "https://t.me/GrayHatsHack/6811", "content": "Top 5 Trending CVEs:\n\n    1 - CVE-2024-5806\n    2 - CVE-2024-34102\n    3 - CVE-2024-23958\n    4 - CVE-2024-37032\n    5 - CVE-2024-21338\n\n#cve #cvetrends #cveshield #cybersecurity", "creation_timestamp": "2024-06-27T05:11:41.000000Z"}, {"uuid": "4331aa3f-af00-4d8b-9b8a-0af8a032dd22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "seen", "source": "https://t.me/true_secator/6054", "content": "\u041f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u043c \u0441\u043b\u0435\u0434\u0438\u0442\u044c \u0437\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c\u0438 \u0438 \u043d\u043e\u0432\u0435\u0439\u0448\u0438\u043c\u0438 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044f\u043c\u0438 \u043f\u043e \u0418\u0411-\u0443\u0433\u0440\u043e\u0437\u0430\u043c.\n\n11-\u043b\u0435\u0442\u043d\u044f\u044f \u043e\u0448\u0438\u0431\u043a\u0430 CVE-2024-5535, , \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043c\u043e\u0433\u043b\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0434\u043b\u044f \u0443\u0442\u0435\u0447\u043a\u0438 \u043f\u0430\u043c\u044f\u0442\u0438 \u0441\u0435\u0440\u0432\u0435\u0440\u0430, \u043d\u0430\u043a\u043e\u043d\u0435\u0446-\u0442\u043e, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 OpenSSL.\n\nCrowdfense \u0432\u044b\u043a\u0430\u0442\u0438\u043b\u0430 \u0430\u043d\u0430\u043b\u0438\u0437 \u0432 \u043e\u0442\u043d\u043e\u0448\u0435\u043d\u0438\u0438 LPE-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043e\u0442\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u043c\u043e\u0439 \u043a\u0430\u043a CVE-2024-21338, \u0432 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 Windows AppLocker, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0431\u044b\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 \u0432 \u0444\u0435\u0432\u0440\u0430\u043b\u0435 \u044d\u0442\u043e\u0433\u043e \u0433\u043e\u0434\u0430.\n\nSecureLayer7 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u043b\u0430 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u043e\u0442\u0447\u0435\u0442 \u043f\u043e CVE-2024-39877, \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 Apache Airflow RCE, \u0442\u0430\u043a\u0436\u0435 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e\u0439 \u043a\u0430\u043a FlowFixation.\n\nCertiK \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0430 \u043c\u043e\u0449\u043d\u044b\u0439 \u0431\u0430\u0440\u044b\u0448 \u043e\u0442 Coinbase \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u0432\u043e\u0437\u043d\u0430\u0433\u0440\u0430\u0436\u0434\u0435\u043d\u0438\u044f \u0437\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043e\u043a.\n\n\u0421\u0443\u043c\u043c\u0430 \u0431\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u043d\u043e\u0441\u0442\u0438 \u0441\u043e\u0441\u0442\u0430\u0432\u0438\u043b\u0430 $500 \u0442\u044b\u0441., \u043d\u043e \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u043e\u0431 \u043e\u0448\u0438\u0431\u043a\u0435 \u043f\u043e\u043a\u0430 \u043d\u0435 \u0440\u0430\u0441\u043a\u0440\u044b\u0432\u0430\u044e\u0442\u0441\u044f.\n\n\u0413\u0440\u0443\u043f\u043f\u0430 \u0443\u0447\u0435\u043d\u044b\u0445 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0430 \u0434\u0432\u0435\u00a0\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0435 Voice over Wi-Fi (VoWiFi), \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0441 2016 \u0433\u043e\u0434\u0430 \u0438 \u0442\u0435\u043f\u0435\u0440\u044c \u0440\u0435\u0430\u043b\u0438\u0437\u0443\u0435\u0442\u0441\u044f \u043f\u043e\u0447\u0442\u0438 \u0432\u0441\u0435\u043c\u0438 \u043e\u0441\u043d\u043e\u0432\u043d\u044b\u043c\u0438 \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u044b\u043c\u0438 \u0441\u0435\u0442\u044f\u043c\u0438 \u0438 \u043d\u0430 \u0432\u0441\u0435\u0445 \u043d\u043e\u0432\u044b\u0445 \u0441\u043c\u0430\u0440\u0442\u0444\u043e\u043d\u0430\u0445.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0433\u043e\u0432\u043e\u0440\u044f\u0442, \u0447\u0442\u043e 13 \u0438\u0437 275 \u043f\u0440\u043e\u0430\u043d\u0430\u043b\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0438\u043c\u0438 \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u044b\u0445 \u0441\u0435\u0442\u0435\u0439 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 \u0441\u0442\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u043a\u043b\u044e\u0447\u0438 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0434\u043b\u044f \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0432\u044b\u0437\u043e\u0432\u043e\u0432 WLAN, \u0447\u0442\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043b\u0435\u0433\u043a\u043e \u043f\u0435\u0440\u0435\u0445\u0432\u0430\u0442\u044b\u0432\u0430\u0442\u044c \u0434\u0430\u043d\u043d\u044b\u0435.\n\n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u0441\u043c\u0430\u0440\u0442\u0444\u043e\u043d\u044b 5G \u0441 \u0447\u0438\u043f\u0430\u043c\u0438 MediaTek \u043c\u043e\u0433\u0443\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0442\u043e\u043b\u044c\u043a\u043e \u0431\u043e\u043b\u0435\u0435 \u0441\u043b\u0430\u0431\u044b\u0435 \u0444\u043e\u0440\u043c\u044b \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0432\u044b\u0437\u043e\u0432\u043e\u0432 WLAN, \u0447\u0442\u043e \u0442\u0430\u043a\u0436\u0435 \u043e\u0442\u043a\u0440\u044b\u0432\u0430\u0435\u0442 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u043f\u0435\u0440\u0435\u0445\u0432\u0430\u0442\u0430.\n\n\u041f\u043e\u0434 \u0443\u0433\u0440\u043e\u0437\u043e\u0439 \u043d\u0430\u0445\u043e\u0434\u044f\u0442\u0441\u044f \u0431\u043e\u043b\u0435\u0435 140 \u043c\u0438\u043b\u043b\u0438\u043e\u043d\u043e\u0432 \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u044b\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439, \u043d\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0443\u0436\u0435 \u0432\u043d\u0435\u0434\u0440\u044f\u044e\u0442\u0441\u044f.\n\nWhite Knight Labs \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u0430 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u0443\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e \u0432 \u043e\u0442\u043d\u043e\u0448\u0435\u043d\u0438\u0438 LayeredSyscall\u00a0- \u043d\u043e\u0432\u043e\u0439 \u0442\u0435\u0445\u043d\u0438\u043a\u0435, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0432\u0435\u043a\u0442\u043e\u0440\u043d\u044b\u0435 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 \u0438\u0441\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0439 (VEH) \u0434\u043b\u044f \u043e\u0431\u0445\u043e\u0434\u0430 \u0440\u0435\u0448\u0435\u043d\u0438\u0439 EDR.\n\n\u0418, \u043a\u0430\u043a \u0433\u043e\u0432\u043e\u0440\u0438\u0442\u0441\u044f \u043d\u0430 \u0434\u0435\u0441\u0435\u0440\u0442, \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0435 [PDF] \u043e\u0442 \u0431\u0435\u043b\u044c\u0433\u0438\u0439\u0441\u043a\u0438\u0445 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u043e\u0432 \u043f\u043e \u0430\u043d\u0430\u043b\u0438\u0437\u0443 \u0437\u0430\u0449\u0438\u0449\u0435\u043d\u043d\u043e\u0441\u0442\u0438 \u043d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u0445 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 \u0434\u043b\u044f \u0437\u043d\u0430\u043a\u043e\u043c\u0441\u0442\u0432.\n\n\u041a\u0430\u043a \u0432\u044b\u044f\u0441\u043d\u0438\u043b\u043e\u0441\u044c, \u0448\u0435\u0441\u0442\u044c \u0438\u0437 15 \u0442\u0430\u043a\u0438\u0445 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439, \u0432\u043a\u043b\u044e\u0447\u0430\u044f Badoo, Bumble, Grindr, happn, Hinge \u0438 Hily, \u0444\u0430\u043a\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0441\u043b\u0438\u0432\u0430\u044e\u0442 \u0442\u043e\u0447\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 \u043e \u043c\u0435\u0441\u0442\u043e\u043f\u043e\u043b\u043e\u0436\u0435\u043d\u0438\u0438 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f, \u044f\u0432\u043b\u044f\u044f\u0441\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u043c\u0438 \u0434\u043b\u044f \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0445 \u0432\u0435\u0440\u0441\u0438\u0439 \u0442\u0440\u0438\u0430\u043d\u0433\u0443\u043b\u044f\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0430\u0442\u0430\u043a\u0438.\n\n\u041f\u043e\u043c\u0438\u043c\u043e \u0434\u0430\u043d\u043d\u044b\u0445 \u043e \u043c\u0435\u0441\u0442\u043e\u043f\u043e\u043b\u043e\u0436\u0435\u043d\u0438\u0438, 15 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 \u0442\u0430\u043a\u0436\u0435 \u043e\u0442\u043a\u0440\u044b\u0432\u0430\u043b\u0438 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043b\u0438\u0447\u043d\u043e\u0439 \u0438 \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438  \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439.", "creation_timestamp": "2024-08-02T17:50:05.000000Z"}, {"uuid": "757c24e9-0d8c-42ad-99d1-93a5b8e11207", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "exploited", "source": "https://t.me/true_secator/5471", "content": "Lazarus Group \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430 CVE-2024-21338 \u0432 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 AppLocker \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 0-day \u0434\u043b\u044f \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0432 \u0430\u0442\u0430\u043a\u0430\u0445, \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044f \u0440\u0443\u0442\u043a\u0438\u0442 FudModule.\n\n\u0420\u0430\u0441\u043a\u0440\u044b\u0442\u044c \u043a\u043e\u0432\u0430\u0440\u043d\u044b\u0445 \u0441\u0435\u0432\u0435\u0440\u043e\u043a\u043e\u0440\u0435\u0439\u0446\u0435\u0432 \u0441\u043c\u043e\u0433\u043b\u0438 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Avast, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0432 \u0430\u0432\u0433\u0443\u0441\u0442\u0435 2023 \u0433\u043e\u0434\u0430 \u043f\u0440\u043e\u0438\u043d\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043b\u0438 Microsoft \u043e\u0431 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0438 CVE-2024-21338 \u0438 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u043b\u0438 \u0443\u0431\u0435\u0434\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0439 PoC.\n\n\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u043a \u0431\u044b\u043b \u0437\u0430\u043a\u0440\u044b\u0442 Microsoft \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 PatchTuesday \u0432 \u0444\u0435\u0432\u0440\u0430\u043b\u0435 2024 \u0433\u043e\u0434\u0430. \u041e\u0434\u043d\u0430\u043a\u043e Microsoft \u043f\u0440\u0438 \u044d\u0442\u043e\u043c \u0443\u043c\u043e\u043b\u0447\u0430\u043b\u0430 \u043e\u0431 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043a\u0430\u043a 0-day.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0434\u0440\u0430\u0439\u0432\u0435\u0440 appid.sys, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0439 \u0441 \u0444\u0443\u043d\u043a\u0446\u0438\u0435\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 AppLocker \u043e\u0442 Microsoft, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u0435\u0442 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0432\u043d\u0435\u0441\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 \u0432 \u0431\u0435\u043b\u044b\u0439 \u0441\u043f\u0438\u0441\u043e\u043a.\n\n\u041d\u0430\u0446\u0435\u043b\u0438\u0432\u0448\u0438\u0441\u044c \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 \u0447\u0435\u0440\u0435\u0437 \u0434\u0438\u0441\u043f\u0435\u0442\u0447\u0435\u0440 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0432\u0432\u043e\u0434\u043e\u043c \u0438 \u0432\u044b\u0432\u043e\u0434\u043e\u043c (IOCTL), \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u0440\u0438\u0441\u0443\u0442\u0441\u0442\u0432\u0443\u0435\u0442 \u0432\u043e \u043c\u043d\u043e\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445, \u0432\u043c\u0435\u0441\u0442\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f BYOVD, \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u0434\u043e\u0431\u0438\u043b\u0441\u044f \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u043a\u0440\u044b\u0442\u043d\u043e\u0441\u0442\u0438.\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0442\u0430\u043a\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u0432 \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u043e\u043c \u0441\u043c\u044b\u0441\u043b\u0435 \u0440\u0435\u0430\u043b\u0438\u0437\u0443\u0435\u0442 Living off the Land \u0431\u0435\u0437 \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e\u0441\u0442\u0438 \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0442\u044c \u043a\u0430\u043a\u0438\u0435-\u043b\u0438\u0431\u043e \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u0438\u0435 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u044b, \u0447\u0442\u043e \u0434\u0435\u043b\u0430\u0435\u0442 \u0430\u0442\u0430\u043a\u0443 \u044f\u0434\u0440\u0430 \u0444\u0430\u043a\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0431\u0435\u0437\u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044f \u043e\u0431\u0445\u043e\u0434\u0438\u0442\u044c \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u043e \u0437\u0430\u0449\u0438\u0442\u043d\u044b\u0445 \u0440\u0435\u0448\u0435\u043d\u0438\u0439.\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f CVE-2024-21338, Lazarus \u0441\u043c\u043e\u0433\u043b\u0438 \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u043d\u0430 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u0438 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0440\u0438\u043c\u0438\u0442\u0438\u0432 \u0447\u0442\u0435\u043d\u0438\u044f/\u0437\u0430\u043f\u0438\u0441\u0438 \u044f\u0434\u0440\u0430.\n\n\u0410 \u044d\u0442\u043e, \u0432 \u0441\u0432\u043e\u044e \u043e\u0447\u0435\u0440\u0435\u0434\u044c, \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u043b\u043e \u0438\u043c \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u044f\u043c\u044b\u0435 \u043c\u0430\u043d\u0438\u043f\u0443\u043b\u044f\u0446\u0438\u0438 \u0441 \u043e\u0431\u044a\u0435\u043a\u0442\u0430\u043c\u0438 \u044f\u0434\u0440\u0430 (DKOM) \u0432 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438 \u0440\u0443\u0442\u043a\u0438\u0442\u0430 FudModule, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u044f\u0432\u0438\u043b\u0430\u0441\u044c \u0432 2022 \u0433\u043e\u0434\u0443 \u0438 \u0431\u044b\u043b\u0430 \u0437\u0430\u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0430 ESET.\n\n\u0420\u0430\u043d\u0435\u0435 \u0440\u0443\u0442\u043a\u0438\u0442\u00a0\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b \u0434\u0440\u0430\u0439\u0432\u0435\u0440 Dell \u0434\u043b\u044f \u0430\u0442\u0430\u043a BYOVD.\n\n\u041d\u043e\u0432\u044b\u0439 \u0436\u0435 \u0432\u0430\u0440\u0438\u0430\u043d\u0442 \u0440\u0443\u0442\u043a\u0438\u0442\u0430 \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u0432 \u0441\u0435\u0431\u044f \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0443\u043b\u0443\u0447\u0448\u0435\u043d\u0438\u0439, \u043f\u0440\u0435\u0436\u0434\u0435 \u0432\u0441\u0435\u0433\u043e \u0432 \u0447\u0430\u0441\u0442\u0438 \u0441\u043a\u0440\u044b\u0442\u043d\u043e\u0441\u0442\u0438 \u0438 \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u0438, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043d\u043e\u0432\u044b\u0435 \u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044b\u0435 \u043c\u0435\u0442\u043e\u0434\u044b \u0443\u043a\u043b\u043e\u043d\u0435\u043d\u0438\u044f \u043e\u0442 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0438 \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u044f \u0441\u0440\u0435\u0434\u0441\u0442\u0432 \u0437\u0430\u0449\u0438\u0442\u044b, \u0442\u0430\u043a\u0438\u0445 \u043a\u0430\u043a AhnLab V3 Endpoint, Windows Defender, CrowdStrike Falcon \u0438 HitmanPro.\n\n\u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u043d\u0430\u0431\u043b\u044e\u0434\u0430\u0435\u043c\u0430\u044f \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u044f Lazarus \u043f\u043e\u043c\u0438\u043c\u043e 0-day \u0442\u0430\u043a\u0436\u0435 \u043e\u0442\u043c\u0435\u0442\u0438\u043b\u0430\u0441\u044c \u043f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u0435\u043c \u043d\u043e\u0432\u043e\u0433\u043e RAT, \u043e \u043a\u043e\u0442\u043e\u0440\u043e\u043c \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043d\u0430\u043c\u0435\u0440\u0435\u043d\u044b \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e \u0440\u0430\u0441\u0441\u043a\u0430\u0437\u0430\u0442\u044c \u043f\u043e\u0437\u0436\u0435 \u043d\u0430 \u043a\u043e\u043d\u0444\u0435\u0440\u0435\u043d\u0446\u0438\u0438 BlackHat Asia \u0432 \u0430\u043f\u0440\u0435\u043b\u0435.\n\nAvast \u043e\u0442\u043c\u0435\u0447\u0430\u044e\u0442, \u0447\u0442\u043e \u044d\u0442\u0430 \u043d\u043e\u0432\u0430\u044f \u0442\u0430\u043a\u0442\u0438\u043a\u0430 Lazarus \u0437\u043d\u0430\u043c\u0435\u043d\u0443\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u0437\u043d\u0430\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u0443\u044e \u044d\u0432\u043e\u043b\u044e\u0446\u0438\u044e \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u0435\u0439 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u044f\u0434\u0440\u0443, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044f  \u043f\u0440\u043e\u0432\u043e\u0434\u0438\u0442\u044c \u0431\u043e\u043b\u0435\u0435 \u0441\u043a\u0440\u044b\u0442\u044b\u0435 \u0430\u0442\u0430\u043a\u0438 \u0438 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u0442\u044c \u043f\u0440\u0438\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435 \u0432 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 \u0432 \u0442\u0435\u0447\u0435\u043d\u0438\u0435 \u0431\u043e\u043b\u0435\u0435 \u0434\u043b\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0445 \u043f\u0435\u0440\u0438\u043e\u0434\u043e\u0432 \u0432\u0440\u0435\u043c\u0435\u043d\u0438.\n\n\u041f\u0440\u0430\u0432\u0438\u043b\u0430 YARA, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0435 \u0441 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0439 \u0432\u0435\u0440\u0441\u0438\u0435\u0439 \u0440\u0443\u0442\u043a\u0438\u0442\u0430 FudModule, \u043c\u043e\u0436\u043d\u043e \u043d\u0430\u0439\u0442\u0438\u00a0\u0437\u0434\u0435\u0441\u044c.", "creation_timestamp": "2024-02-29T14:37:58.000000Z"}, {"uuid": "31fecfd9-0219-43bd-ba9e-4853f315b93a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "seen", "source": "https://t.me/ctinow/184106", "content": "https://ift.tt/I2qeugN\nCVE-2024-21338 | Microsoft Windows up to Server 2022 23H2 Kernel Local Privilege Escalation", "creation_timestamp": "2024-02-13T20:06:41.000000Z"}, {"uuid": "8981ed3c-36a5-4ac3-a935-79ad2e824cde", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "seen", "source": "https://t.me/ctinow/195824", "content": "https://ift.tt/nOhZxQJ\nCVE-2024-21338 Exploitation", "creation_timestamp": "2024-02-28T20:16:57.000000Z"}, {"uuid": "e9db5811-21ca-4794-822a-e020f5e7d938", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "seen", "source": "https://t.me/ctinow/196914", "content": "https://ift.tt/cBK5YFZ\nLazarus Group Targets Windows Zero-Day CVE-2024-21338 to Disable Antivirus Software - BNN Breaking", "creation_timestamp": "2024-02-29T18:51:29.000000Z"}, {"uuid": "0d8cb91a-7b2a-4615-b545-f7388651b8a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "seen", "source": "https://t.me/ctinow/196429", "content": "https://ift.tt/SLByiP8\nLazarus Group Escalates Cyber Warfare, Exploiting Unknown Windows Kernel Flaw CVE-2024-21338 - BNN Breaking", "creation_timestamp": "2024-02-29T09:56:59.000000Z"}, {"uuid": "c6028590-fb32-4194-a0fd-7e6b0a1d1bdb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "exploited", "source": "https://t.me/information_security_channel/51638", "content": "Windows Zero-Day Exploited by North Korean Hackers in Rootkit Attack\nhttps://www.securityweek.com/windows-zero-day-exploited-by-north-korean-hackers-in-rootkit-attack/\n\nNorth Korean group Lazarus exploited AppLocker driver zero-day CVE-2024-21338 for privilege escalation in attacks involving FudModule rootkit.\nThe post Windows Zero-Day Exploited by North Korean Hackers in Rootkit Attack (https://www.securityweek.com/windows-zero-day-exploited-by-north-korean-hackers-in-rootkit-attack/) appeared first on SecurityWeek (https://www.securityweek.com/).", "creation_timestamp": "2024-02-29T13:38:26.000000Z"}, {"uuid": "5890f39d-debe-47e3-a4fa-2233b2463f1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "seen", "source": "https://t.me/theninjaway1337/1416", "content": "CVE-2024-21338 \ud83d\ude31\n\n#exploit #LPE #windows", "creation_timestamp": "2024-03-05T23:52:19.000000Z"}, {"uuid": "3e3a4acf-6fd6-4e63-b2a8-998de2485c8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "exploited", "source": "https://t.me/thehackernews/4619", "content": "\u26a0\ufe0f Lazarus Group hackers found exploiting a Windows kernel zero-day vulnerability (CVE-2024-21338) weeks after a patch was released, allowing them to gain system-level control and disable security software on targeted systems. \n \nDetails here: https://thehackernews.com/2024/02/lazarus-hackers-exploited-windows.html", "creation_timestamp": "2024-02-29T12:24:27.000000Z"}, {"uuid": "c9b47518-c43e-4a46-9c64-c45bce166d14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "exploited", "source": "https://t.me/xakep_ru/15482", "content": "Lazarus \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430 0-day \u0432 Windows \u0434\u043b\u044f \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0443\u0440\u043e\u0432\u043d\u044f \u044f\u0434\u0440\u0430\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Avast \u0440\u0430\u0441\u0441\u043a\u0430\u0437\u0430\u043b\u0438, \u0447\u0442\u043e \u0441\u0435\u0432\u0435\u0440\u043e\u043a\u043e\u0440\u0435\u0439\u0441\u043a\u0430\u044f \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0430 Lazarus \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0432 Windows \u043a\u0430\u043a 0-day. \u042d\u0442\u043e\u0442 \u0431\u0430\u0433 \u0431\u044b\u043b \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d \u0432 \u0444\u0435\u0432\u0440\u0430\u043b\u0435 2024 \u0433\u043e\u0434\u0430, \u043b\u0438\u0448\u044c \u0447\u0435\u0440\u0435\u0437 \u043f\u043e\u043b\u0433\u043e\u0434\u0430 \u043f\u043e\u0441\u043b\u0435 \u0442\u043e\u0433\u043e, \u043a\u0430\u043a Microsoft \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0438, \u0447\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0436\u0435 \u0432\u0437\u044f\u0442\u0430 \u043d\u0430 \u0432\u043e\u043e\u0440\u0443\u0436\u0435\u043d\u0438\u0435 \u0445\u0430\u043a\u0435\u0440\u0430\u043c\u0438.\n\nhttps://xakep.ru/2024/03/04/cve-2024-21338-lazarus/", "creation_timestamp": "2024-03-04T14:33:28.000000Z"}, {"uuid": "b1681861-aa55-4c32-9d7c-507bbdf1cff6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "published-proof-of-concept", "source": "https://t.me/suboxone_chatroom/1034", "content": "CVE-2024-21338\n\nLocal Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.\n\n\nJoin our groups for more Hacking \n\n\ud83d\udc79Join Telegram Group:- \nhttps://t.me/SuBoXoneSoCiety\n\n\ud83d\udc7fJoin Whatsapp community group:https://whatsapp.com/channel/0029VaGX1X47T8bP63aZhb22", "creation_timestamp": "2025-01-16T08:39:01.000000Z"}, {"uuid": "38b71920-8524-4840-8532-b7df41e86c09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2330", "content": "https://github.com/hakaioffsec/CVE-2024-21338\n\nLocal Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.\n#github #\u63d0\u6743 #tools", "creation_timestamp": "2024-04-17T05:36:44.000000Z"}, {"uuid": "bf414226-68da-4915-b23f-3735a7f63174", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10345", "content": "#exploit\n1. ZIP embedding attack on Google Chrome extensions\nhttps://readme.synack.com/exploits-explained-zip-embedding-attack-on-google-chrome-extensions\n\n2. CVE-2024-21338:\nWindows 10/11 Admin-to-Kernel EoP/LPE\nhttps://github.com/hakaioffsec/CVE-2024-21338\n]-&gt; https://hakaisecurity.io/cve-2024-21338-from-admin-to-kernel-through-token-manipulation-and-windows-kernel-exploitation/research-blog", "creation_timestamp": "2024-04-16T16:50:57.000000Z"}, {"uuid": "47969003-ef5b-4de7-ac60-aaebc53eaf5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "seen", "source": "Telegram/axySgRzALAUNzPTufFbm7YGMZV3QS9LDW1TbLIPQL1zTGWQ", "content": "", "creation_timestamp": "2024-04-23T00:04:28.000000Z"}, {"uuid": "0bee9756-e865-4006-b9ed-e0632fe96da4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "exploited", "source": "https://t.me/suboxone_chatroom/1031", "content": "CVE-2024-21338\n\nLocal Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.\n\nJoin our groups for more Hacking \n\n\ud83d\udc79Join Telegram Group:- \nhttps://t.me/SuBoXoneSoCiety\n\n\ud83d\udc7fJoin Whatsapp community group:https://whatsapp.com/channel/0029VaGX1X47T8bP63aZhb22", "creation_timestamp": "2025-01-16T08:36:25.000000Z"}, {"uuid": "dd10c38f-6e14-4fb5-a978-ae7afee60bd6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21338", "type": "seen", "source": "https://t.me/kasraone_com/693", "content": "\ud83d\udd34 CVE-2024-21338\n\n\n\u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc LPE \u0627\u0632 Admin \u062a\u0627 Kernel \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645 \u0639\u0627\u0645\u0644 \u0647\u0627\u06cc \u0648\u06cc\u0646\u062f\u0648\u0632 10 \u0648 \u0648\u06cc\u0646\u062f\u0648\u0632 11 \u0628\u0627 HVCI \u0641\u0639\u0627\u0644 \u0627\u0633\u062a.\n\nLink News\n\n\n\n\u00a0\u00a0\u00a0\u00a0\u00a0 \u00a0\u00a0 \u2661 \u2800\u2800 \u3007\u2800\u00a0 \u2800 \u2399\u2800\u200c\u00a0 \u200c \u2332\u2063 \n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \u02e1\u2071\u1d4f\u1d49\u00a0 \u1d9c\u1d52\u1d50\u1d50\u1d49\u207f\u1d57\u00a0\u00a0 \u02e2\u1d43\u1d5b\u1d49\u00a0 \u02e2\u02b0\u1d43\u02b3\u1d49\n\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 K1\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 kasraone", "creation_timestamp": "2024-04-29T04:46:44.000000Z"}]}