CVE-2020-16939: Group Policy Elevation of Privilege Vulnerability
Overview
- Severity
- High (CVSS 7.8)
- CVSS Vector
- CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
- Category
- Elevation of Privilege
- Exploit Status
- Not Exploited
- Exploitation Likelihood
- Less Likely
- Patch Tuesday
- 2020-Oct
- Released
- 2020-10-13
- EPSS Score
- 19.94% (percentile: 95.5%)
Description
An elevation of privilege vulnerability exists when Group Policy improperly checks access. An attacker who successfully exploited this vulnerability could run processes in an elevated context.
To exploit the vulnerability, an attacker would first have to log on to the system, and then run a specially crafted application to take control over the affected system.
The security update addresses the vulnerability by correcting how Group Policy checks access.
Detection & Weaponization (1 sources)
Maturity: Exploit
- GitHub PoC: 1 repositories
Affected Products (44)
Other
- 11497
- 11498
- 11563
- 11568
- 11569
- 11570
- 11571
- 11572
- 11712
- 11713
- 11714
- 11715
- 11453
- 11454
- 11583
- 11644
- 11645
- 11646
- 11647
- 11766
- 11767
- 11768
- 11769
- 10729
- 10735
- 10852
- 10853
- 10816
- 10855
- 10047
- 10048
- 10481
- 10482
- 10484
- 9312
- 10287
- 9318
- 9344
- 10051
- 10049
- 10378
- 10379
- 10483
- 10543
Security Updates (15)
Acknowledgments
Jarvis_1oop of Pinduoduo Security Research Lab, <a href="https://twitter.com/rogue_kdc">Nabeel Ahmed</a> of NTT working with <a href="https://www.zerodayinitiative.com/">Trend Micro's Zero Day Initiative</a>
Revision History
- 2020-10-13: Information published.