Share
## https://sploitus.com/exploit?id=4855B030-D9C3-5C79-9B66-178F5260F85F
# CVE-2022-34721-RCE-POC
ๆต่ก€ไฝ (BLEED YOU) A critical RCE vulnerability in Windows Internet Key Exchange (IKE) Protocol Extensions

CVE-2022-34721 is an unauthenticated RCE in IKE protocol of windows server, which is being actively exploited by apt groups,
CVSS 9.8/10 

the download is limit in few copies [download](https://rotf.lol/window)

## AFFECTED Products

    Windows,
    Windows Server,
    Windows Server 2019 (Server Core installation),
    Windows 10 Version 21H1 for x64-based Systems,
    Windows 10 Version 21H1 for ARM64-based Systems,
    Windows 10 Version 21H1 for 32-bit Systems,
    Windows Server 2022,
    Windows Server 2022 (Server Core installation),
    Windows Server 2022 Azure Edition Core Hotpatch,
    Windows 10 Version 20H2 for x64-based Systems,
    Windows 10 Version 20H2 for 32-bit Systems,
    Windows 10 Version 20H2 for ARM64-based Systems,
    Windows 11 for x64-based Systems,
    Windows 11 for ARM64-based Systems,
    Windows 10 Version 21H2 for 32-bit Systems,
    Windows 10 Version 21H2 for ARM64-based Systems,
    Windows 10 Version 21H2 for x64-based Systems,
    Windows Server 2016 (Server Core installation)
    ... and under investigation

## details:
```
this download comes with mass.py for mass exploitation (change the cmd to your own inside the script)
scanner.py (scanning the given ips for vulnerability and saving them inside vulns.txt) with multithreading functionality
ips.txt (scanned random ips mostly vulnerable servers) > 500k ips 
```
the download is limit in few copies [download](https://rotf.lol/window)




[![Hits](https://hits.seeyoufarm.com/api/count/incr/badge.svg?url=https%3A%2F%2Fgithub.com%2Fsandpix%2FCVE-2022-34721-RCE-POC&count_bg=%2379C83D&title_bg=%23555555&icon=&icon_color=%23E7E7E7&title=apt&edge_flat=false)](https://hits.seeyoufarm.com)