- This exploit targets eneio64.sys, a vulnerable driver offering read/write primitives on the system's physical memory. The associated CVE is CVE-2020-12446. I'm not the one behind this CVE discovery, all credit goes to @ihack4falafel.
- This exploit targets Windows 11 22H2. Check the
nt!HalpLMStub
&EPROCESS
/KTHREAD
offsets if you're targeting another Windows version. - eneio64.sys is currently (March 8, 2025) tolerated by HVCI which reinforces the Vulnerable Driver Blocklist. eneio64.sys can be loaded on Windows 11 23H2 and 24H2 as well.
- The main purpose of this exploit is to demonstrate how to map virtual addresses to physical addresses using the same virtual-to-physical translation process as the OS. A walkthrough of this POC is published here.
- The exploit presented here enables privilege elevation via token theft.
- For educational purposes only.
-
Notifications
You must be signed in to change notification settings - Fork 1
Exploit for eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W
Xacone/Eneio64-Driver-Exploit
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Latest commit | ||||
Repository files navigation
About
Exploit for eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W
Topics
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published