{"vulnerability": "CVE-2024-30085", "sightings": [{"uuid": "2ce96b4a-af62-4d5e-bcec-b675d9ac3571", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30085", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3ldvrcv5rgk26", "content": "", "creation_timestamp": "2024-12-22T15:49:04.008995Z"}, {"uuid": "f8e20b43-3ef7-48a0-a24d-ddb3e03fb69f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30085", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3ldzog7g5zk2l", "content": "", "creation_timestamp": "2024-12-24T05:07:55.330610Z"}, {"uuid": "d2f70e84-cbb5-4616-9a4a-27b8c7b3854d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30085", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3le27m2xpky27", "content": "", "creation_timestamp": "2024-12-24T10:15:24.272923Z"}, {"uuid": "5318c935-2f86-4c94-8622-3602ffa9f7f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-30085", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3le46pq2fhk25", "content": "", "creation_timestamp": "2024-12-25T05:04:51.968754Z"}, {"uuid": "1f1c9106-6408-474d-9c7a-ba7aef1b3437", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30085", "type": "seen", "source": "https://infosec.exchange/users/dragonjar/statuses/113713117828225078", "content": "", "creation_timestamp": "2024-12-25T11:01:20.612167Z"}, {"uuid": "17001581-c11b-4b85-914f-8a1c5b764e05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30085", "type": "seen", "source": "https://mastodon.social/users/hrbrmstr/statuses/113735998581379936", "content": "", "creation_timestamp": "2024-12-29T12:00:18.730225Z"}, {"uuid": "0f80ec58-66f4-414e-9932-372e5109a421", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30085", "type": "seen", "source": "https://bsky.app/profile/hrbrmstr.mastodon.social.ap.brid.gy/post/3legxskycjvo2", "content": "", "creation_timestamp": "2024-12-29T12:00:40.086594Z"}, {"uuid": "1165a7cb-9e43-4e1e-bbdb-914146132b22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30085", "type": "seen", "source": "MISP/71f05cce-2beb-4b80-8496-bbbabc032544", "content": "", "creation_timestamp": "2025-08-25T18:31:43.000000Z"}, {"uuid": "2daea770-1eed-4582-8888-ba4b35d16cdc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30085", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/cve_2024_30085_cloud_files.rb", "content": "", "creation_timestamp": "2025-03-20T20:52:56.000000Z"}, {"uuid": "0ef3297d-7ef8-42a9-9c10-3ee7e1d7737b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30085", "type": "seen", "source": "https://bsky.app/profile/reddogsecurity.bsky.social/post/3llrkcg4vtu27", "content": "", "creation_timestamp": "2025-04-01T18:54:25.833227Z"}, {"uuid": "1b92c32e-0e06-440a-b5a5-7ad44cba839d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30085", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:02.000000Z"}, {"uuid": "70fc23a5-304b-47ed-af82-924872308e12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30085", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3mgb7jnmwv22q", "content": "", "creation_timestamp": "2026-03-04T21:19:15.994791Z"}, {"uuid": "7c191eeb-361c-406c-ba76-2eba2c76177f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30085", "type": "seen", "source": "https://infosec.exchange/users/alexandreborges/statuses/116172161342991986", "content": "", "creation_timestamp": "2026-03-04T17:48:25.717152Z"}, {"uuid": "e3a2ef17-dfcb-4268-941b-84080b9746d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30085", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/9623", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1a Exploit en Python dise\u00f1ado para aprovechar la vulnerabilidad de elevaci\u00f3n de privilegios CVE-2024-30085\nURL\uff1ahttps://github.com/murdok1982/Exploit-PoC-para-CVE-2024-30085\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-12-28T10:06:57.000000Z"}, {"uuid": "69431f46-5214-4109-b9b4-edaa57d939be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30085", "type": "seen", "source": "https://bsky.app/profile/alexandreborges.bsky.social/post/3mgatqiwxk22q", "content": "", "creation_timestamp": "2026-03-04T17:48:22.939939Z"}, {"uuid": "0348709e-16f5-4f27-8ab7-e48b27eb9cd1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30085", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3miexsm2kry2d", "content": "", "creation_timestamp": "2026-03-31T20:02:08.849011Z"}, {"uuid": "fb7d525d-c09b-4608-9a1b-c64788481e98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30085", "type": "seen", "source": "https://bsky.app/profile/alexandreborges.bsky.social/post/3mieyjmfuas2h", "content": "", "creation_timestamp": "2026-03-31T20:15:06.650759Z"}, {"uuid": "aaac0098-debd-4eae-b242-78f40607cb77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30085", "type": "seen", "source": "https://infosec.exchange/users/dragonjar/statuses/116408385891917391", "content": "", "creation_timestamp": "2026-04-15T11:03:25.874820Z"}, {"uuid": "5940e699-0a63-4c21-b166-16d3bb7483c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30085", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/9597", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-30085 (Alex Birnberg)\nURL\uff1ahttps://github.com/Adamkadaban/CVE-2024-30085\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-12-25T06:06:34.000000Z"}, {"uuid": "12a37437-713b-4719-9d4d-bd8f9e033e34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30085", "type": "seen", "source": "https://infosec.exchange/users/dragonjar/statuses/116329107783430964", "content": "", "creation_timestamp": "2026-04-01T11:01:58.427036Z"}, {"uuid": "85547fa6-b042-4b3d-a722-55c5ae91e2f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30085", "type": "seen", "source": "https://infosec.exchange/users/alexandreborges/statuses/116483747479373095", "content": "", "creation_timestamp": "2026-04-28T18:28:54.269806Z"}, {"uuid": "1ca24839-46e1-4b1d-a3f1-45d1565163b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30085", "type": "seen", "source": "https://bsky.app/profile/infosecbot.bsky.social/post/3mklpcd4vr22s", "content": "", "creation_timestamp": "2026-04-28T23:08:54.412843Z"}, {"uuid": "d4a447ec-e477-496e-8b5a-df7db444ca58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30085", "type": "published-proof-of-concept", "source": "https://t.me/CyberBulletin/1820", "content": "\u26a1\ufe0fPoC Exploit Released for CVE-2024-30085: Windows Elevation of Privilege Vulnerability.\n\n#CyberBulletin", "creation_timestamp": "2024-12-24T09:08:09.000000Z"}, {"uuid": "cb769308-a9f6-4676-9b89-a6fc371da266", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30085", "type": "published-proof-of-concept", "source": "https://t.me/poxek/4735", "content": "All I Want for Christmas is a CVE-2024-30085 Exploit\n#windows #privesc #microsoft\n\n\u0421\u0442\u0430\u0442\u044c\u044f \u043e\u0442 StarsLab - \u044d\u0442\u043e \u0442\u0435 \u0441\u0430\u043c\u044b\u0435 \u0440\u0435\u0431\u044f\u0442\u0430, \u0447\u0442\u043e \u043e\u0442\u0440\u0435\u043f\u043e\u0440\u0442\u0438\u043b\u0438 \u043f\u0430\u0447\u043a\u0443 CVE \u0432 1C Bitrix, \u0442\u0430\u043a \u0447\u0442\u043e \u0441\u0442\u0430\u0442\u044c\u044f \u043a\u0430\u043a \u043c\u0438\u043d\u0438\u043c\u0443\u043c \u0434\u043e\u0441\u0442\u043e\u0439\u043d\u0430 \u0432\u0430\u0448\u0435\u0433\u043e \u0432\u043d\u043c\u0430\u043d\u0438\u044f)\n\nCVE-2024-30085 is a heap-based buffer overflow vulnerability affecting the Windows Cloud Files Mini Filter Driver cldflt.sys. By crafting a custom reparse point, it is possible to trigger the buffer overflow to corrupt an adjacent _WNF_STATE_DATA object. The corrupted _WNF_STATE_DATA object can be used to leak a kernel pointer from an ALPC handle table object. A second buffer overflow is then used to corrupt another _WNF_STATE_DATA object, which is then used to corrupt an adjacent PipeAttribute object. By forging a PipeAttribute object in userspace, we are able to leak the token address and override privileges to escalate privileges to NT AUTHORITY\\SYSTEM.\n\n\u27a1\ufe0f\u0427\u0438\u0442\u0430\u0442\u044c \u0434\u0430\u043b\u0435\u0435\n\u27a1\ufe0fVideo PoC (\u0442\u043e\u0442 \u0436\u0435, \u0447\u0442\u043e \u043f\u0440\u0438\u043a\u0440\u0435\u043f\u043b\u0435\u043d \u043a \u043f\u043e\u0441\u0442\u0443)\n\ud83d\udcf1 Github PoC\n\n\u2615\ufe0f \u0412\u0441\u0435\u0445 \u0441 \u043d\u0430\u0441\u0442\u0443\u043f\u0430\u044e\u0449\u0438\u043c!\n\n\ud83c\udf1a @poxek | \ud83d\udcfa YT | \ud83d\udcfa RT | \ud83d\udcfa VK | \ud83c\udf1a \u041c\u0430\u0433\u0430\u0437\u0438\u043d \u043c\u0435\u0440\u0447\u0430 \u041f\u0440\u043e\u0434\u0430\u0436\u0438 \u0437\u0430\u043a\u0440\u044b\u0442\u044b \u0434\u043e \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0435\u0433\u043e \u0433\u043e\u0434\u0430", "creation_timestamp": "2024-12-25T15:00:11.000000Z"}, {"uuid": "b5eb1bfe-60b3-4ba8-81ee-f4121165e96b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30085", "type": "published-proof-of-concept", "source": "https://t.me/poxek/4734", "content": "CVE-2024-30085 PoC", "creation_timestamp": "2024-12-25T13:41:22.000000Z"}, {"uuid": "a9cee8fd-fba3-4c6b-99d1-59864554bc2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30085", "type": "published-proof-of-concept", "source": "https://t.me/ptescalator/80", "content": "\u041c\u044b, ESC-VR, \u0443\u0441\u043f\u0435\u0448\u043d\u043e \u0432\u043e\u0441\u043f\u0440\u043e\u0438\u0437\u0432\u0435\u043b\u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u0434\u043b\u044f CVE-2024-30085  \ud83d\ude0e\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0438\u0433\u0443\u0440\u0438\u0440\u043e\u0432\u0430\u043b\u0430 \u043d\u0430 \u043f\u0440\u043e\u0448\u0435\u0434\u0448\u0435\u043c \u0432 Pwn2Own 2024 \u0432 \u0412\u0430\u043d\u043a\u0443\u0432\u0435\u0440\u0435, \u0433\u0434\u0435 Team Theori \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u0434\u043b\u044f \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0446\u0435\u043f\u043e\u0447\u043a\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u0432, \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043b\u044f\u044e\u0449\u0438\u0445 Guest-To-Host-Escape \u0438\u0437-\u043f\u043e\u0434 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f VMware Workstation, \u0437\u0430 \u0447\u0442\u043e \u0438 \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0438 \u0441\u0432\u043e\u0438 \u0437\u0430\u0441\u043b\u0443\u0436\u0435\u043d\u043d\u044b\u0435 13 \u043e\u0447\u043a\u043e\u0432 \u0432 \u043d\u043e\u043c\u0438\u043d\u0430\u0446\u0438\u0438 Master Of Pwn.\n\n\u0421\u043e\u0440\u0435\u0432\u043d\u043e\u0432\u0430\u043d\u0438\u044f \u043f\u043e \u0442\u0438\u043f\u0443 pwn2own \u0438 matrixcup \u043f\u043e\u043c\u043e\u0433\u0430\u044e\u0442 \u043f\u043e\u0434\u0441\u0432\u0435\u0442\u0438\u0442\u044c \u0440\u0435\u0430\u043b\u044c\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u044b \u0434\u043b\u044f \u043a\u043e\u0442\u043e\u0440\u044b\u0445, \u043a\u0430\u043a \u043f\u0440\u0430\u0432\u0438\u043b\u043e, \u043d\u0435 \u0440\u0430\u0437\u0433\u043b\u0430\u0448\u0430\u044e\u0442\u0441\u044f (\u0432 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u0447\u0435\u0433\u043e \u043e\u0431\u0440\u0430\u0437\u0443\u0435\u0442\u0441\u044f \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 Known-Unkown, \u043a\u043e\u0433\u0434\u0430 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e, \u0447\u0442\u043e \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u0435\u0441\u0442\u044c, \u043d\u043e \u043a\u0430\u043a \u043e\u043d \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u043d\u0435\u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e), \u0438 \u043e\u0431\u0440\u0430\u0442\u0438\u0442\u044c \u043d\u0430 \u043d\u0438\u0445 \u043e\u0441\u043e\u0431\u043e\u0435 \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u0435, \u0432\u0435\u0434\u044c \u0437\u0430 \u043f\u043e\u0434\u043e\u0431\u043d\u044b\u043c\u0438 \u0441\u043e\u0440\u0435\u0432\u043d\u043e\u0432\u0430\u043d\u0438\u044f\u043c\u0438 \u0441\u043b\u0435\u0434\u0438\u043c \u043d\u0435 \u0442\u043e\u043b\u044c\u043a\u043e \u043c\u044b, \u043d\u043e \u0438 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043c\u043e\u0436\u0435\u0442 \u0438\u0445 \u0432\u043e\u0441\u043f\u0440\u043e\u0438\u0437\u0432\u0435\u0441\u0442\u0438 \u0438 \u043f\u0440\u043e\u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u043f\u0440\u043e\u0442\u0438\u0432 \u043d\u0435\u0437\u0430\u043f\u0430\u0442\u0447\u0435\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b.\n\n\ud83e\uddd0 Cldflt.sys \u2014 \u044d\u0442\u043e \u0434\u0440\u0430\u0439\u0432\u0435\u0440 \u043c\u0438\u043d\u0438-\u0444\u0438\u043b\u044c\u0442\u0440, \u043e\u0442\u0432\u0435\u0447\u0430\u044e\u0449\u0438\u0439 \u0437\u0430 \u0441\u0438\u043d\u0445\u0440\u043e\u043d\u0438\u0437\u0430\u0446\u0438\u044e \u043c\u0435\u0436\u0434\u0443 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u043e\u0439 \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u043e\u0439 \u0438 \u043e\u0431\u043b\u0430\u043a\u043e\u043c OneDrive. \u0412 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043e\u0432\u0430\u043b\u0430 \u043e\u0448\u0438\u0431\u043a\u0430 CWE-122, \u0432\u043e\u0437\u043d\u0438\u043a\u0430\u044e\u0449\u0430\u044f \u0432 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0440\u0430\u0437\u043c\u0435\u0440\u0430 bitmap, \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u043c\u043e\u0435 \u043a\u043e\u0442\u043e\u0440\u043e\u0433\u043e \u043f\u043e\u043b\u0443\u0447\u0430\u0435\u0442\u0441\u044f \u0438\u0437 Reparse Point. \u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u043f\u0430\u043c\u044f\u0442\u044c, \u0430\u043b\u043b\u043e\u0446\u0438\u0440\u0443\u0435\u043c\u0430\u044f \u043f\u043e\u0434 bitmap, \u0438\u043c\u0435\u0435\u0442 \u0444\u0438\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0440\u0430\u0437\u043c\u0435\u0440 4096 \u0431\u0430\u0439\u0442, \u043d\u043e \u043f\u0440\u0438 \u044d\u0442\u043e\u043c \u043d\u0435 \u043f\u0440\u043e\u0432\u0435\u0440\u044f\u0435\u0442\u0441\u044f \u0440\u0430\u0437\u043c\u0435\u0440 \u0430\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0431\u0443\u0434\u0443\u0442 \u0441\u043a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u043d\u044b \u0432 \u0430\u043b\u043b\u043e\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u0443\u044e \u043f\u0430\u043c\u044f\u0442\u044c. \n\n\u041d\u0430\u0448 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u0443\u0442\u0438\u043b\u0438\u0437\u0438\u0440\u0443\u0435\u0442 WNF- \u0438 ALPC- \u043f\u043e\u0434\u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0434\u043b\u044f \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u043c\u0438\u0442\u0438\u0432\u043e\u0432 \u043d\u0430 \u0437\u0430\u043f\u0438\u0441\u044c \u0438 \u0447\u0442\u0435\u043d\u0438\u0435, \u043a\u043e\u043d\u043a\u0440\u0435\u0442\u043d\u043e \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b _WNF_STATE_DATA \u0438 _ALPC_HANDLE_ENTRY.\n\n\ud83d\udca1 \u041d\u0435\u043c\u043d\u043e\u0433\u043e \u0434\u0435\u0442\u0430\u043b\u0435\u0439 \u043e \u0442\u043e\u043c, \u043a\u0430\u043a \u043d\u0430\u0448 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442:\n\n1\ufe0f\u20e3 \u0421\u043e\u0437\u0434\u0430\u0435\u0442 \u043c\u043d\u043e\u0436\u0435\u0441\u0442\u0432\u0430 \u0447\u0430\u043d\u043a\u043e\u0432, \u0440\u0430\u0437\u043c\u0435\u0440\u043e\u043c 4096 \u0431\u0430\u0439\u0442, \u0447\u0435\u0440\u0435\u0437 NtCreateWnfStateName \u0438 NtAlpcCreateResourceReserve. \u0422\u0430\u043a\u0438\u043c \u043e\u0431\u0440\u0430\u0437\u043e\u043c \u043f\u043e\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u043d\u043e \u0432 \u043f\u0430\u043c\u044f\u0442\u0438 \u0440\u0430\u0437\u043c\u0435\u0449\u0430\u0435\u0442\u0441\u044f _WNF_STATE_DATA \u0438 _ALPC_HANDLE_ENTRY.\n\n2\ufe0f\u20e3 \u0421\u043e\u0437\u0434\u0430\u0435\u0442 \u043c\u043d\u043e\u0436\u0435\u0441\u0442\u0432\u0430 \u0434\u044b\u0440 \u0432 \u043f\u043e\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u0438 \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u043e\u0439 \u043d\u0430 \u0448\u0430\u0433\u0435 1, \u0447\u0435\u0440\u0435\u0437 NtDeleteWnfStateData.\n\n3\ufe0f\u20e3 \u0422\u0440\u0438\u0433\u0433\u0435\u0440\u0438\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0442\u0430\u043a\u0438\u043c \u043e\u0431\u0440\u0430\u0437\u043e\u043c bitmap \u0440\u0430\u0437\u043c\u0435\u0449\u0430\u0435\u0442\u0441\u044f \u0432 \u043e\u0434\u043d\u043e\u0439 \u0438\u0437 \u0437\u0430\u0440\u0430\u043d\u0435\u0435 \u043f\u043e\u0434\u0433\u043e\u0442\u043e\u0432\u043b\u0435\u043d\u044b \u0434\u044b\u0440. \u0420\u0430\u0437\u043c\u0435\u0440 bitmap \u0437\u0430\u0434\u0430\u0435\u0442\u0441\u044f \u0440\u0430\u0432\u043d\u044b\u0439 4096 + 16, \u0447\u0442\u043e\u0431\u044b \u043f\u0435\u0440\u0435\u0437\u0430\u043f\u0438\u0441\u0430\u0442\u044c \u0440\u0430\u0437\u043c\u0435\u0440 \u0434\u0430\u043d\u043d\u044b\u0445 (_WNF_STATE_DATA.DataSize), \u043d\u0430 \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0443\u043a\u0430\u0437\u044b\u0432\u0430\u0435\u0442 _WNF_STATE_DATA.Data.\n\n4\ufe0f\u20e3 \u041f\u0435\u0440\u0435\u0437\u0430\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u0442 \u0447\u0435\u0440\u0435\u0437 NtUpdateWnfStateData \u0443\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u0438 \u0432 _ALPC_HANDLE_ENTRY.\n\n5\ufe0f\u20e3 \u041e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043b\u044f\u0435\u0442 \u0447\u0435\u0440\u0435\u0437 NtAlpcSendWaitReceivePort \u0437\u0430\u043f\u0438\u0441\u044c \u0438 \u0447\u0442\u0435\u043d\u0438\u0435 \u043f\u043e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u043c\u0443 \u0430\u0434\u0440\u0435\u0441\u0443.\n\n6\ufe0f\u20e3 \u041a\u0440\u0430\u0434\u0435\u0442 Token \u0443 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430 System (Token Stealing).\n\n\u041a\u043e\u043d\u0435\u0447\u043d\u043e \u0436\u0435, \u043c\u044b \u043d\u0435 \u043c\u043e\u0433\u043b\u0438 \u043d\u0435 \u043f\u0440\u043e\u0442\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u043d\u0430\u0448\u0438 \u0441\u043e\u0431\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0435 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b. \u0418 \u043e\u043d\u0438 \u043d\u0430\u0441 \u043d\u0435 \u0440\u0430\u0437\u043e\u0447\u0430\u0440\u043e\u0432\u0430\u043b\u0438: \u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, PT Sandbox \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0432\u0430\u0435\u0442 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044e \u0434\u0430\u043d\u043d\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438.\n\n\u0412\u0435\u0440\u0434\u0438\u043a\u0442\u044b:\n\n\nExploit.Win32.Generic.d,\nExploit.Win32.Generic.a,\nRootkit.Win32.Generic.a\n\n\n#escvr #cve #news\n@ptescalator", "creation_timestamp": "2024-09-10T09:26:48.000000Z"}, {"uuid": "e0baea95-589b-401f-b51d-9b415f538c70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30085", "type": "seen", "source": "https://t.me/itsec_news/5777", "content": "\u200b\u26a1\ufe0f11 \u0446\u0438\u0444\u0440\u043e\u0432\u044b\u0445 \u0434\u044b\u0440, \u0447\u0435\u0440\u0435\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0436\u043d\u043e \u0443\u043d\u0435\u0441\u0442\u0438 \u0432\u0441\u0451: \u043e\u0442 \u0434\u0430\u043d\u043d\u044b\u0445 \u0434\u043e \u043d\u0430\u0441\u0442\u0440\u043e\u0435\u043d\u0438\u044f\n\n\ud83d\udcac \u042d\u043a\u0441\u043f\u0435\u0440\u0442\u044b Positive Technologies \u043e\u0442\u043d\u0435\u0441\u043b\u0438 \u043a \u0447\u0438\u0441\u043b\u0443 \u0442\u0440\u0435\u043d\u0434\u043e\u0432\u044b\u0445 \u0435\u0449\u0451 \u043e\u0434\u0438\u043d\u043d\u0430\u0434\u0446\u0430\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0449\u0438\u0445 \u043a\u043b\u044e\u0447\u0435\u0432\u044b\u0435 \u044d\u043b\u0435\u043c\u0435\u043d\u0442\u044b \u0446\u0438\u0444\u0440\u043e\u0432\u043e\u0439 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b. \u0412 \u0441\u043f\u0438\u0441\u043e\u043a \u0432\u043e\u0448\u043b\u0438 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b Microsoft, \u0433\u0438\u043f\u0435\u0440\u0432\u0438\u0437\u043e\u0440\u044b VMware, \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u043b\u0435\u0440 Kubernetes \u0438 \u0432\u0435\u0431-\u0441\u0435\u0440\u0432\u0435\u0440 Apache Tomcat.\n\nMicrosoft\n\nCVE-2024-30085 \u2014 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 Windows Cloud Files Mini Filter (CVSS 7.8) \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0435\u043c\u0443 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c SYSTEM-\u0434\u043e\u0441\u0442\u0443\u043f. \u041e\u0448\u0438\u0431\u043a\u0430 \u0432\u044b\u0437\u0432\u0430\u043d\u0430 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435\u043c \u0431\u0443\u0444\u0435\u0440\u0430 \u043a\u0443\u0447\u0438 \u043f\u0440\u0438 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0435 \u0431\u0438\u0442\u043e\u0432\u044b\u0445 \u043a\u0430\u0440\u0442. \u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 : \u0441\u0435\u0433\u043c\u0435\u043d\u0442\u0430\u0446\u0438\u044f \u0441\u0435\u0442\u0438, PoLP, \u0443\u0441\u0438\u043b\u0435\u043d\u043d\u044b\u0439 \u043c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433.\n\nCVE-2025-24983 \u2014 \u043e\u0448\u0438\u0431\u043a\u0430 \u0432 \u043f\u043e\u0434\u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u044f\u0434\u0440\u0430 Win32 (CVSS 7.0) \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0447\u0435\u0440\u0435\u0437 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u0443\u044e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0443, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0433\u043e\u043d\u043a\u0443. \u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 : \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0445 \u043f\u0440\u0430\u0432, \u043c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433 \u043f\u043e\u043f\u044b\u0442\u043e\u043a \u044d\u0441\u043a\u0430\u043b\u0430\u0446\u0438\u0438.\n\nCVE-2025-26633 \u2014 \u043e\u0431\u0445\u043e\u0434 \u0437\u0430\u0449\u0438\u0442\u044b \u0432 Microsoft Management Console (CVSS 7.0). \u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u0432\u043d\u0435\u0434\u0440\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 MSC-\u0444\u0430\u0439\u043b \u0447\u0435\u0440\u0435\u0437 \u0444\u0438\u0448\u0438\u043d\u0433. \u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 : \u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u043a\u0430 MSC \u0438 VHD-\u0444\u0430\u0439\u043b\u043e\u0432 \u043d\u0430 \u043f\u0440\u043e\u043a\u0441\u0438 \u0438 \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u044d\u043a\u0440\u0430\u043d\u0430\u0445.\n\nCVE-2025-24071 \u2014 \u0441\u043f\u0443\u0444\u0438\u043d\u0433 \u0432 Windows File Explorer (CVSS 7.5). \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c NTLM-\u0445\u0435\u0448\u0438, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044f LIBRARY-MS-\u0444\u0430\u0439\u043b\u044b. \u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 : \u043f\u043e\u0434\u043f\u0438\u0441\u044b\u0432\u0430\u043d\u0438\u0435 SMB, \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435 NTLM.\n\nCVE-2025-24993 \u2014 RCE \u0432 \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 NTFS (CVSS 7.8). \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0447\u0435\u0440\u0435\u0437 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 VHD-\u0434\u0438\u0441\u043a.\n\nCVE-2025-24985 \u2014 \u0430\u043d\u0430\u043b\u043e\u0433\u0438\u0447\u043d\u0430\u044f RCE-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Fast FAT (CVSS 7.8), \u0442\u0430\u043a\u0436\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 VHD \u0434\u043b\u044f \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e.\n\nVMware\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c Shadowserver, \u0431\u043e\u043b\u0435\u0435 40 \u0442\u044b\u0441. \u0443\u0437\u043b\u043e\u0432 ESXi \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b \u0438\u0437\u0432\u043d\u0435 \u0438 \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b \u0440\u0438\u0441\u043a\u0443:\n\nCVE-2025-22224 (CVSS 9.3) \u2014 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u0430\u044f \u0437\u0430\u043f\u0438\u0441\u044c \u0447\u0435\u0440\u0435\u0437 TOCTOU \u0432 \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0435 ESXi \u0438 Workstation.\n\nCVE-2025-22225 (CVSS 8.2) \u2014 \u0437\u0430\u043f\u0438\u0441\u044c \u043a\u043e\u0434\u0430 \u0432 \u043e\u0431\u043b\u0430\u0441\u0442\u044c \u044f\u0434\u0440\u0430 VMX-\u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430.\n\nCVE-2025-22226 (CVSS 7.1) \u2014 \u0443\u0442\u0435\u0447\u043a\u0430 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0447\u0435\u0440\u0435\u0437 \u0447\u0442\u0435\u043d\u0438\u0435 \u0437\u0430 \u043f\u0440\u0435\u0434\u0435\u043b\u0430\u043c\u0438 \u0434\u043e\u043f\u0443\u0441\u0442\u0438\u043c\u043e\u0433\u043e \u0434\u0438\u0430\u043f\u0430\u0437\u043e\u043d\u0430 \u0432 HGFS.\n\n\u0420\u0435\u0448\u0435\u043d\u0438\u044f : \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 VMware Workstation 17.6.3, Fusion 13.6.3 \u0438 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0445 \u043f\u0430\u0442\u0447\u0435\u0439.\n\nKubernetes\n\nCVE-2025-1974 (CVSS 9.8) \u2014 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 ingress-nginx \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043a\u043e\u0434 \u043d\u0430 \u0443\u0440\u043e\u0432\u043d\u0435 \u043a\u043b\u0430\u0441\u0442\u0435\u0440\u0430. \u041f\u043e\u0434 \u0443\u0434\u0430\u0440\u043e\u043c \u0431\u043e\u043b\u0435\u0435 6500 \u0438\u043d\u0441\u0442\u0430\u043d\u0441\u043e\u0432, \u043f\u043e \u0434\u0430\u043d\u043d\u044b\u043c Wiz .\n\n\u041c\u0435\u0440\u044b \u0437\u0430\u0449\u0438\u0442\u044b : \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 ingress-nginx, \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435 Validating Admission Controller \u0438 \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0445 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u043e\u0432.\n\nApache\n\nCVE-2025-24813 (CVSS 9.8) \u2014 RCE \u0432 Tomcat \u0447\u0435\u0440\u0435\u0437 \u0447\u0430\u0441\u0442\u0438\u0447\u043d\u044b\u0435 PUT-\u0437\u0430\u043f\u0440\u043e\u0441\u044b \u0438 \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044e. \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0435 Rapid7 \u0432\u044b\u044f\u0432\u0438\u043b\u043e ~200 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432.\n\n\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 : \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043e Tomcat 9.0.99, 10.1.35, 11.0.3 \u0438 \u0432\u044b\u0448\u0435.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2025-04-11T17:25:57.000000Z"}, {"uuid": "c09e55cc-0453-4490-b8c9-83c36244f399", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30085", "type": "published-proof-of-concept", "source": "https://t.me/ptescalator/287", "content": "\u041a\u043e\u0440\u043d\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2024-30085 \ud83c\udf33\n\n\u0415\u0449\u0435 \u0432 \u0441\u0435\u043d\u0442\u044f\u0431\u0440\u0435 \u043f\u0440\u043e\u0448\u043b\u043e\u0433\u043e \u0433\u043e\u0434\u0430 \u043c\u044b \u0432 ESC-VR \u0443\u0441\u043f\u0435\u0448\u043d\u043e \u0432\u043e\u0441\u043f\u0440\u043e\u0438\u0437\u0432\u0435\u043b\u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u0434\u043b\u044f CVE-2024-30085 \u2014 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u043f\u043e\u0434\u0441\u0438\u0441\u0442\u0435\u043c\u0435 Windows Cloud Files Mini Filter. \u041a\u043e\u0434 \u043f\u043e\u0434\u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0440\u0430\u0441\u043f\u043e\u043b\u0430\u0433\u0430\u0435\u0442\u0441\u044f \u0432 cldflt.sys \u2014 \u044d\u0442\u043e \u0434\u0440\u0430\u0439\u0432\u0435\u0440 \u043c\u0438\u043d\u0438-\u0444\u0438\u043b\u044c\u0442\u0440\u0430, \u0438 \u043e\u043d \u043e\u0442\u043d\u043e\u0441\u0438\u0442\u0441\u044f \u043a \u043f\u0440\u0435\u0434\u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u043a\u043b\u0438\u0435\u043d\u0442\u0443 \u043e\u0431\u043b\u0430\u0447\u043d\u043e\u0433\u043e \u0441\u0435\u0440\u0432\u0438\u0441\u0430 Microsoft OneDrive.\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0438 \u0441\u0432\u044f\u0437\u043a\u0443 WNF + ALPC, \u043c\u044b \u0441\u043e\u0437\u0434\u0430\u043b\u0438 \u043f\u0440\u0438\u043c\u0438\u0442\u0438\u0432\u044b \u043d\u0430 \u0447\u0442\u0435\u043d\u0438\u0435 \u0438 \u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u044f\u0434\u0435\u0440\u043d\u0443\u044e \u043f\u0430\u043c\u044f\u0442\u044c. \u0411\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u044f \u044d\u0442\u043e\u043c\u0443 \u0443\u043a\u0440\u0430\u043b\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u0439 \u0442\u043e\u043a\u0435\u043d \u0438 \u0437\u0430\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u0442\u0435\u0440\u043c\u0438\u043d\u0430\u043b \u0441 \u043f\u0440\u0430\u0432\u0430\u043c\u0438 NT AUTHORITY\\SYSTEM.\n\n\ud83e\uddd0 \u041d\u0430 \u0434\u043d\u044f\u0445 \u0432 \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0435\u043d\u0438\u0435 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438 \u043c\u044b \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u044b\u0439 \u0440\u0430\u0437\u0431\u043e\u0440 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2024-30085 \u0438 \u0442\u0435\u0445\u043d\u0438\u043a, \u043f\u0440\u0438\u043c\u0435\u043d\u0438\u043c\u044b\u0445 \u0432\u043e \u0432\u0440\u0435\u043c\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u043a\u0443\u0447\u0438 \u0432 \u044f\u0434\u0440\u0435 Windows 10 22H2 19045.3803.\n\n\u0427\u0438\u0442\u0430\u0439\u0442\u0435 \u0440\u0430\u0437\u0431\u043e\u0440 \u0432 \u0431\u043b\u043e\u0433\u0435 \u043d\u0430 \u0425\u0430\u0431\u0440\u0435.\n\n#escvr #cve #win\n@ptescalator", "creation_timestamp": "2025-03-11T14:10:47.000000Z"}, {"uuid": "8310287b-a6e6-4017-a06e-9fc2f05e0804", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30085", "type": "published-proof-of-concept", "source": "https://t.me/haccking/11784", "content": "\u041f\u043e\u0432\u044b\u0448\u0430\u0435\u043c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0432 Windows \u0447\u0435\u0440\u0435\u0437 CVE-2024-30085\n\n#cve #\u0441\u0442\u0430\u0442\u044c\u044f #lpe\n\nCVE-2024-30085 \u2014 \u044d\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043f\u043e\u0434\u0441\u0438\u0441\u0442\u0435\u043c\u0435 Windows Cloud Files Mini Filter. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0438\u0433\u0443\u0440\u0438\u0440\u043e\u0432\u0430\u043b\u0430 \u043d\u0430 \u043f\u0440\u043e\u0448\u0435\u0434\u0448\u0435\u043c \u0432 \u0412\u0430\u043d\u043a\u0443\u0432\u0435\u0440\u0435 Pwn2Own 2024, \u0433\u0434\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u0430 \u0440\u0435\u0441\u0451\u0440\u0447\u0435\u0440\u043e\u0432 Team Theori \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u0434\u043b\u044f \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0446\u0435\u043f\u043e\u0447\u043a\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u0432, \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043b\u044f\u044e\u0449\u0438\u0445 Guest-to-Host-Escape (\u043f\u043e\u0431\u0435\u0433 \u0438\u0437 \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0439 \u043c\u0430\u0448\u0438\u043d\u044b) \u0438\u0437-\u043f\u043e\u0434 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f VMware workstation.\n\n\u0412 \u044d\u0442\u043e\u0439 \u0441\u0442\u0430\u0442\u044c\u0435 \u043c\u044b \u0440\u0430\u0441\u0441\u043c\u043e\u0442\u0440\u0438\u043c \u043a\u043e\u0440\u043d\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2024-30085 \u0438 \u0442\u0435\u0445\u043d\u0438\u043a\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438, \u043f\u0440\u0438\u043c\u0435\u043d\u0438\u043c\u044b\u0435 \u0432\u043e \u0432\u0440\u0435\u043c\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u043a\u0443\u0447\u0438 \u0432 \u044f\u0434\u0440\u0435 Windows 10 22H2 19045.3803.\n\n\ud83d\udd17 \u0421\u0441\u044b\u043b\u043a\u0430 \u043d\u0430 \u0441\u0442\u0430\u0442\u044c\u044e\n\nLH | News | OSINT | AI", "creation_timestamp": "2025-03-27T13:22:23.000000Z"}, {"uuid": "ca340b13-d958-4359-a8cf-f84effd0ea48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30085", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/768", "content": "#exploit\n1. A Practical Guide to PrintNightmare in 2024 (updated\u00a0Oct 5)\nhttps://itm4n.github.io/printnightmare-exploitation\n]-&gt; PnP bypass\n\n2. CVE-2024-12209:\nWP Umbrella Unauthenticated LFI\nhttps://github.com/Nxploited/CVE-2024-12209\n\n3. CVE-2024-30085:\nWindows 11 23H2 EoP\nhttps://ssd-disclosure.com/ssd-advisory-cldflt-heap-based-overflow-pe", "creation_timestamp": "2024-12-24T12:49:11.000000Z"}, {"uuid": "3ebc404d-5669-432c-9525-1ab8622de549", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30085", "type": "seen", "source": "https://t.me/suboxone_chatroom/1577", "content": "#exploit\n1. A Practical Guide to PrintNightmare in 2024 (updated\u00a0Oct 5)\nhttps://itm4n.github.io/printnightmare-exploitation\n]-&gt; PnP bypass\n\n2. CVE-2024-12209:\nWP Umbrella Unauthenticated LFI\nhttps://github.com/Nxploited/CVE-2024-12209\n\n3. CVE-2024-30085:\nWindows 11 23H2 EoP\nhttps://ssd-disclosure.com/ssd-advisory-cldflt-heap-based-overflow-pe", "creation_timestamp": "2025-01-27T07:07:44.000000Z"}, {"uuid": "1d2f32ac-bdd3-4cb8-aa38-7d79d1b7ebaa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30085", "type": "published-proof-of-concept", "source": "https://t.me/CyberBulletin/26905", "content": "\u26a1\ufe0fPoC Exploit Released for CVE-2024-30085: Windows Elevation of Privilege Vulnerability.\n\n#CyberBulletin", "creation_timestamp": "2024-12-24T09:08:09.000000Z"}, {"uuid": "219b7547-1752-4c92-bbcd-a6726f5998de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30085", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11600", "content": "#exploit\n1. A Practical Guide to PrintNightmare in 2024 (updated\u00a0Oct 5)\nhttps://itm4n.github.io/printnightmare-exploitation\n]-&gt; PnP bypass\n\n2. CVE-2024-12209:\nWP Umbrella Unauthenticated LFI\nhttps://github.com/Nxploited/CVE-2024-12209\n\n3. CVE-2024-30085:\nWindows 11 23H2 EoP\nhttps://ssd-disclosure.com/ssd-advisory-cldflt-heap-based-overflow-pe", "creation_timestamp": "2024-12-24T17:57:48.000000Z"}, {"uuid": "6ee32029-cb9d-40e1-9c48-b40703a7cb41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30085", "type": "published-proof-of-concept", "source": "https://t.me/suboxone_chatroom/2806", "content": "All I Want for Christmas is a CVE-2024-30085 Exploit\n\n\ud83d\udd17 Link\n\n#binary \n#exploitation \n#windows\n#driver\n\u2014\u2014\u2014", "creation_timestamp": "2025-02-15T20:01:41.000000Z"}]}