cve/2019/CVE-2019-0732.md

21 lines
982 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-0732](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0732)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Security%20Feature%20Bypass&color=brighgreen)
### Description
A security feature bypass vulnerability exists in Windows which could allow an attacker to bypass Device Guard when Windows improperly handles calls to the LUAFV driver (luafv.sys), aka 'Windows Security Feature Bypass Vulnerability'.
### POC
#### Reference
- http://packetstormsecurity.com/files/152536/Microsoft-Windows-LUAFV-NtSetCachedSigningLevel-Device-Guard-Bypass.html
- https://www.exploit-db.com/exploits/46716/
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/punishell/WindowsLegacyCVE