CVE-2020-16939: Group Policy Elevation of Privilege Vulnerability

Overview

Severity
High (CVSS 7.8)
CVSS Vector
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
Category
Elevation of Privilege
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2020-Oct
Released
2020-10-13
EPSS Score
19.94% (percentile: 95.5%)

Description

An elevation of privilege vulnerability exists when Group Policy improperly checks access. An attacker who successfully exploited this vulnerability could run processes in an elevated context. To exploit the vulnerability, an attacker would first have to log on to the system, and then run a specially crafted application to take control over the affected system. The security update addresses the vulnerability by correcting how Group Policy checks access.

Detection & Weaponization (1 sources)

Maturity: Exploit

  • GitHub PoC: 1 repositories

Affected Products (44)

Other

  • 11497
  • 11498
  • 11563
  • 11568
  • 11569
  • 11570
  • 11571
  • 11572
  • 11712
  • 11713
  • 11714
  • 11715
  • 11453
  • 11454
  • 11583
  • 11644
  • 11645
  • 11646
  • 11647
  • 11766
  • 11767
  • 11768
  • 11769
  • 10729
  • 10735
  • 10852
  • 10853
  • 10816
  • 10855
  • 10047
  • 10048
  • 10481
  • 10482
  • 10484
  • 9312
  • 10287
  • 9318
  • 9344
  • 10051
  • 10049
  • 10378
  • 10379
  • 10483
  • 10543

Security Updates (15)

Acknowledgments

Jarvis_1oop of Pinduoduo Security Research Lab, <a href="https://twitter.com/rogue_kdc">Nabeel Ahmed</a> of NTT working with <a href="https://www.zerodayinitiative.com/">Trend Micro's Zero Day Initiative</a>

Revision History

  • 2020-10-13: Information published.