### [CVE-2021-1732](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1732) ![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%201803&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%201809&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%201909&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%202004&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%2020H2&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202019%20(Server%20Core%20installation)&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202019&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%20version%202004&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%20version%2020H2&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%2C%20version%201909%20(Server%20Core%20installation)&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=10.0.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20Privilege&color=brightgreen) ### Description Windows Win32k Elevation of Privilege Vulnerability ### POC #### Reference - http://packetstormsecurity.com/files/161880/Win32k-ConsoleControl-Offset-Confusion.html - http://packetstormsecurity.com/files/166169/Win32k-ConsoleControl-Offset-Confusion-Privilege-Escalation.html #### Github - https://github.com/0day404/vulnerability-poc - https://github.com/20142995/sectool - https://github.com/3th1c4l-t0n1/awesome-csirt - https://github.com/4dp/CVE-2021-1732 - https://github.com/ARPSyndicate/cvemon - https://github.com/ASR511-OO7/windows-kernel-exploits - https://github.com/Al1ex/WindowsElevation - https://github.com/ArrestX/--POC - https://github.com/Ascotbe/Kernelhub - https://github.com/B0nfee/CVE-2022-21882 - https://github.com/BeneficialCode/CVE-2021-1732 - https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/awesome-cve-repo - https://github.com/CVEDB/top - https://github.com/Challengers-win/Sec-Interview-ai - https://github.com/ClassBluer/Exploit_Tools - https://github.com/Cruxer8Mech/Idk - https://github.com/CyberMonitor/somethingweneed - https://github.com/David-Honisch/CVE-2022-21882 - https://github.com/EdgeSecurityTeam/Vulnerability - https://github.com/ExploitCN/CVE-2021-1732-EXP- - https://github.com/GhostTroops/TOP - https://github.com/JERRY123S/all-poc - https://github.com/Jkrasher/WindowsThreatResearch_JKrasher - https://github.com/KaLendsi/CVE-2021-1732-Exploit - https://github.com/KaLendsi/CVE-2022-21882 - https://github.com/KayCHENvip/vulnerability-poc - https://github.com/LegendSaber/exp_x64 - https://github.com/Miraitowa70/POC-Notes - https://github.com/Mr-xn/Penetration_Testing_POC - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/Pai-Po/CVE-2021-1732 - https://github.com/ReJimp/Kernel_Exploit - https://github.com/S3cur3Th1sSh1t/My-starred-Repositories - https://github.com/SYRTI/POC_to_review - https://github.com/Sausageinforest/CVE-2021-1732 - https://github.com/SecWiki/windows-kernel-exploits - https://github.com/SexyBeast233/SecBooks - https://github.com/SofianeHamlaoui/Conti-Clear - https://github.com/Spacial/awesome-csirt - https://github.com/Threekiii/Awesome-POC - https://github.com/TrojanAZhen/Self_Back - https://github.com/WhooAmii/POC_to_review - https://github.com/XiaomingX/awesome-poc-for-red-team - https://github.com/YOunGWebER/cve_2021_1732 - https://github.com/YangSirrr/YangsirStudyPlan - https://github.com/albinjoshy03/windows-kernel-exploits - https://github.com/alian87/windows-kernel-exploits - https://github.com/asepsaepdin/CVE-2021-1732 - https://github.com/asr511/windows-kernel-exploits - https://github.com/bhassani/Recent-CVE - https://github.com/brimstone/stars - https://github.com/cyberanand1337x/bug-bounty-2022 - https://github.com/d4n-sec/d4n-sec.github.io - https://github.com/demilson/Windows - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/dishfwk/CVE-2022-21882 - https://github.com/exploitblizzard/Windows-Privilege-Escalation-CVE-2021-1732 - https://github.com/fei9747/WindowsElevation - https://github.com/fenalik/CVE-2021-1732 - https://github.com/fenasal/CVE-2021-1732 - https://github.com/hktalent/TOP - https://github.com/hktalent/bug-bounty - https://github.com/hugefiver/mystars - https://github.com/huike007/penetration_poc - https://github.com/huisetiankong478/penetration_poc - https://github.com/iGen1us/Windows-Kernal-CVE - https://github.com/jbmihoub/all-poc - https://github.com/jessica0f0116/cve_2022_21882-cve_2021_1732 - https://github.com/joydo/CVE-Writeups - https://github.com/k-k-k-k-k/CVE-2021-1732 - https://github.com/k0imet/CVE-POCs - https://github.com/k0mi-tg/CVE-POC - https://github.com/linuxdy/CVE-2021-1732_exp - https://github.com/lions2012/Penetration_Testing_POC - https://github.com/ltfafei/my_POC - https://github.com/lyshark/Windows-exploits - https://github.com/manas3c/CVE-POC - https://github.com/mishmashclone/SecWiki-windows-kernel-exploits - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/oneoy/CVE-2021-1732-Exploit - https://github.com/paramint/windows-kernel-exploits - https://github.com/pawan-shivarkar/pawan-shivarkar - https://github.com/r1l4-i3pur1l4/CVE-2021-1732 - https://github.com/r1l4-i3pur1l4/CVE-2022-21882 - https://github.com/r2bet/CVE-2021-1732 - https://github.com/ratw/CVE-2021-1732 - https://github.com/reph0r/Poc-Exp-Tools - https://github.com/reph0r/Shooting-Range - https://github.com/reph0r/poc-exp - https://github.com/reph0r/poc-exp-tools - https://github.com/salutdamour/Kernel_Exploit - https://github.com/shanshanerxi/Red-blue-confrontation - https://github.com/soosmile/POC - https://github.com/taielab/awesome-hacking-lists - https://github.com/trhacknon/Pocingit - https://github.com/tzwlhack/Vulnerability - https://github.com/weeka10/-hktalent-TOP - https://github.com/whoforget/CVE-POC - https://github.com/win32kdie/Kernel_Exploit - https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC- - https://github.com/xuetusummer/Penetration_Testing_POC - https://github.com/yangshifan-git/CVE-2021-1732 - https://github.com/ycdxsb/WindowsPrivilegeEscalation - https://github.com/yisan1/hh - https://github.com/youwizard/CVE-POC - https://github.com/zecool/cve