From ef55c4f2c10ed876781f0fc80fe646562bd67018 Mon Sep 17 00:00:00 2001 From: jheysel-r7 Date: Wed, 30 Aug 2023 12:11:37 -0400 Subject: [PATCH] Update documentation/modules/exploit/windows/local/cve_2023_28252_clfs_driver.md --- .../modules/exploit/windows/local/cve_2023_28252_clfs_driver.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/documentation/modules/exploit/windows/local/cve_2023_28252_clfs_driver.md b/documentation/modules/exploit/windows/local/cve_2023_28252_clfs_driver.md index 793faae416e1..ad0ce2b2841e 100644 --- a/documentation/modules/exploit/windows/local/cve_2023_28252_clfs_driver.md +++ b/documentation/modules/exploit/windows/local/cve_2023_28252_clfs_driver.md @@ -1,7 +1,7 @@ ## Vulnerable Application A privilege escalation vulnerability exists in the clfs.sys driver which comes installed by default on -Windows 10 21H2, Windows 11 21H2 and Windows Server 20348 operating systems. +Windows 10 21H2, Windows 11 21H2 and Windows Server 2022 (Build 20348) operating systems. The clfs.sys driver contains a function CreateLogFile that is used to create open and edit '*.blf' (base log format) files. Inside a .blf file there are multiple blocks of data which