Microsoft Windows DCOM-RPC NTLM Reflection Elevation of Privilege Exploit

This update adds an exploit which implements the Rotten Potato technique to perform a Local Privilege Escalation. It leverages on local DCOM DCE/RPC connections that can be reflected back to a listening TCP socket allowing access to an NTLM authentication challenge for LocalSystem user which can be replayed to the local DCOM activation service. An attacker who successfully exploited this vulnerability could bypass security and gain elevated privileges on a targeted system.
Exploit type: 
Vulnerabilty ID: 
Released Date: 
Wednesday, February 13, 2019 - 18:00