Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2025-33073

Description

Improper access control in Windows SMB allows an authorized attacker to elevate privileges over a network.

POC

Reference

- https://www.vicarius.io/vsociety/posts/cve-2025-33073-detection-script-improper-access-control-in-windows-smb-affects-microsoft-products

- https://www.vicarius.io/vsociety/posts/cve-2025-33073-mitigation-script-improper-access-control-in-windows-smb-affects-microsoft-products

Github

- https://github.com/0xMarcio/cve

- https://github.com/Andromeda254/cve

- https://github.com/DakshRocks21/EH_Assignment_Materials

- https://github.com/GhostTroops/TOP

- https://github.com/JFR-C/Windows-Penetration-Testing

- https://github.com/Jean-Francois-C/Windows-Penetration-Testing

- https://github.com/OleFredrik1/remoteKrbRelayx

- https://github.com/PuddinCat/GithubRepoSpider

- https://github.com/Shamhus/Detecting-ADCS-Attacks

- https://github.com/afkfr0mkeyb0ard/CustomKaliSetup

- https://github.com/cve-2025-33073/Avisador

- https://github.com/cve-2025-33073/Backdoor

- https://github.com/cve-2025-33073/CataArquivos

- https://github.com/cve-2025-33073/ConsumindoAPIGoogleGemini

- https://github.com/cve-2025-33073/ContaBanco

- https://github.com/cve-2025-33073/Digitador

- https://github.com/cve-2025-33073/DrRoboTinic

- https://github.com/cve-2025-33073/EstoqueStore

- https://github.com/cve-2025-33073/Ferra

- https://github.com/cve-2025-33073/FiveMGTA5Aprovador

- https://github.com/cve-2025-33073/Horas

- https://github.com/cve-2025-33073/JDKSenhas

- https://github.com/cve-2025-33073/JoJoCafeMYSQL

- https://github.com/cve-2025-33073/ListarIPs

- https://github.com/cve-2025-33073/MemoriaCripto

- https://github.com/cve-2025-33073/Mexe

- https://github.com/cve-2025-33073/NazareTedesco

- https://github.com/cve-2025-33073/RecebimentoEspiao

- https://github.com/cve-2025-33073/SeguidoresTwitterUsandoAPIdoTwitter

- https://github.com/cve-2025-33073/ServicoSystemD

- https://github.com/cve-2025-33073/Shell

- https://github.com/cve-2025-33073/UsurpadoraDeHoras

- https://github.com/cve-2025-33073/cmd

- https://github.com/cve-2025-33073/cmd2

- https://github.com/cve-2025-33073/cve-2025-33073

- https://github.com/cve-2025-33073/javanunes

- https://github.com/cve-2025-33073/pythonPromptFile

- https://github.com/cve-2025-33073/reselinux

- https://github.com/cve-2025-33073/telegrampobot1976

- https://github.com/cve-2025-33073/vermut

- https://github.com/cve-2025-33073/vermut-java

- https://github.com/lineeralgebra/My-Favorite-Boxes

- https://github.com/marc-ko/daily-trending-repo

- https://github.com/matejsmycka/CVE-2025-33073-checker

- https://github.com/mbanyamer/-Windows-11-SMB-Client-RCE-Privilege-Escalation-Exploit-Using-DNS-Poisoning-NTLM-Relay-RPC-Coercion

- https://github.com/mverschu/CVE-2025-33073

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/obscura-cert/CVE-2025-33073

- https://github.com/plzheheplztrying/cve_monitor

- https://github.com/sleepasleepzzz/CVE-2025-33073

- https://github.com/tanjiti/sec_profile

- https://github.com/yembors64632/cve_monitor_Public