### [CVE-2017-0050](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0050) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Kernel&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20Privilege&color=brighgreen) ### Description The kernel API in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7; Windows 8; Windows 10 Gold, 1511, and 1607; Windows RT 8.1; Windows Server 2012 Gold and R2; and Windows Server 2016 does not properly enforce permissions, which allows local users to spoof processes, spoof inter-process communication, or cause a denial of service via a crafted application, aka "Windows Kernel Elevation of Privilege Vulnerability." ### POC #### Reference No PoCs from references. #### Github - https://github.com/Al1ex/WindowsElevation - https://github.com/fei9747/WindowsElevation