Skip to content

ekfkawl/CVE-2024-30804

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

ASUS Driver LPE PoC (Physical Memory Abuse)

Platform Language Type

This is a PoC for Local Privilege Escalation (LPE) that exploits the AsInsHelp64.sys driver. It abuses a legitimate, signed ASUS driver to map physical memory and overwrite kernel tokens, eventually gaining NT AUTHORITY\SYSTEM privileges.

🎯 Vulnerability Info

  • Target: AsInsHelp64.sys (Related to ASUS Fan Xpert < v.10013)
  • Technique: Arbitrary Physical Memory Read/Write
  • Root Cause: The driver exposes an IOCTL that lets any user map physical memory into their virtual address space. By exploiting this, we can modify critical kernel structures without any permission checks.

📋 Supported Environment

  • OS: Windows 10 (2004) ~ Windows 11 (23H2) x64
  • Driver: AsInsHelp64.sys must be loaded.
  • Tools: WinDbg (Required for stability).

🚀 Usage

  1. Run the Exploit
  2. Get Info from WinDbg: Instead of risking a crash by scanning memory, retrieve the exact addresses manually:
    • Get System EPROCESS & CR3: !process 0 0 System
    • Get System Token: dq <System_EPROCESS>+4b8 L1
  3. Input & Pwn: Enter the values into the tool. It will automatically find your process and swap the token.

📖 Step-by-Step Walkthrough

1. Launch the Tool

Run the compiled. The program will ask for System information. image

2. Retrieve System Info (WinDbg)

Open WinDbg and execute the following command to find the System process:

!process 0 0 System

Copy the address following PROCESS and the value of DirBase(CR3) image image

3. Retrieve Token Value

Use the address found in the previous step to read the Token value.

dq <System_EPROCESS_Address>+4b8 L1
image image

4. Exploit & Verify

The tool will locate your process in the kernel, overwrite the token, and spawn a new CMD.

whoami
image

Reference

https://github.com/DriverHunter/Win-Driver-EXP/tree/main/CVE-2024-30804

About

Windows LPE exploit for CVE-2024-30804

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages