- This exploit targets eneio64.sys, a vulnerable driver offering read/write primitives on the system's physical memory. The associated CVE is CVE-2020-12446. I'm not the one behind this CVE discovery, all credit goes to @ihack4falafel.
- This exploit targets Windows 11 22H2. Check the
nt!HalpLMStub&EPROCESS/KTHREADoffsets if you're targeting another Windows version/build. - eneio64.sys is currently (March 8, 2025) tolerated by HVCI which reinforces the Vulnerable Driver Blocklist. eneio64.sys can be loaded on Windows 11 23H2 and 24H2 as well.
- The main purpose of this exploit is to demonstrate how to map virtual addresses to physical addresses using the same virtual-to-physical translation process as the OS. A walkthrough of this POC is published here.
- The exploit presented here enables privilege elevation via token theft.
- For educational purposes only.
Xacone/Eneio64-Driver-Exploits
Folders and files
| Name | Name | Last commit date | ||
|---|---|---|---|---|