Microsoft Windows MQAC.sys Arbitrary Write Local Privilege Escalation Exploit

The MQ Access Control Driver (mqac.sys) present in Microsoft Windows is vulnerable to an arbitrary pointer overwrite. This module allows a local unprivileged user to execute arbitrary code with SYSTEM privileges by sending a specially crafted IOCTL (0x1965020F) to the vulnerable driver.
Exploit Type - Old
Exploits/Local
Exploit Platform
Exploit Type
Product Name