{"uuid": "838ee71c-d056-46fc-b461-e3b58a33c04a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-30090", "type": "published-proof-of-concept", "source": "https://t.me/CypherStar/265", "content": "\ud83d\udcbb Exploiting Windows Kernel via Kernel Streaming Proxying\n\nAn in-depth look at CVE-2024-30090, a vulnerability in Kernel Streaming, allowing privilege escalation via malformed IOCTL requests. By leveraging KS Event mishandling during 32-bit to 64-bit conversions, can exploit the bug pattern to gain arbitrary kernel mode access.\n\n\ud83d\udd17 Research:\nProxying to Kernel - Part I\nProxying to Kernel - Part II\n\n\ud83d\udd17 Source:\nhttps://github.com/Dor00tkit/CVE-2024-30090\n\n#CypherStar", "creation_timestamp": "2024-10-17T18:16:25.000000Z"}