{"uuid": "a2749c3f-3891-4116-9ac2-560f76ef8e85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42046", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/1974", "content": "\ud83d\udd25\ud83d\udd25\ud83d\udd25PoC of wfshbr64.sys LPE(Windows Kernel Mode Anti-Cheat Driver, CVE-2022-42046)\n\nwfshbr64.sys and wfshbr32.sys specially crafted payload allows arbitrary user to perform bitwise operation with arbitrary EPROCESS offset and flags value to purposely elevate the game process to CodeGen Full protection by manipulating EPROCESS.Protection and EPROCESS.SignatureLevel flags (security hole as a feature).\n\n\u26a0\ufe0fThe driver is signed by Microsoft hardware compatibility publisher that is submitted via Microsoft Hardware Program.", "creation_timestamp": "2022-12-24T17:38:18.000000Z"}