CVE-2020-12612

Published: Dic 12, 2023 Last Modified: Nov 21, 2024
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 7,8
Attack Vector: local
Attack Complexity: low
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high

Description

AI Translation Available

An issue was discovered in BeyondTrust Privilege Management for Windows through 5.6. When specifying a program to elevate, it can typically be found within the Program Files (x86) folder and therefore uses the %ProgramFiles(x86)% environment variable. However, when this same policy gets pushed to a 32bit machine, this environment variable does not exist. Therefore, since the standard user can create a user level environment variable, they can repoint this variable to any folder the user has full control of. Then, the folder structure can be created in such a way that a rule matches and arbitrary code runs elevated.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0019
Percentile
0,4th
Updated

EPSS Score Trend (Last 91 Days)

Application

Privilege Management For Windows by Beyondtrust

Version Range Affected
To 5.6 (exclusive)
cpe:2.3:a:beyondtrust:privilege_management_for_windows:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Privilege Management For Windows by Beyondtrust

cpe:2.3:a:beyondtrust:privilege_management_for_windows:5.6:-:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://www.beyondtrust.com/support/changelog/privilege-management-for-windows-…
https://www.beyondtrust.com/trust-center/security-advisories/bt22-09
https://www.beyondtrust.com/support/changelog/privilege-management-for-windows-…
https://www.beyondtrust.com/trust-center/security-advisories/bt22-09