Very High
CVE-2020-1337
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2020-1337
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Description
An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system, aka ‘Windows Print Spooler Elevation of Privilege Vulnerability’.
Add Assessment
Ratings
-
Attacker ValueVery High
-
ExploitabilityHigh
Technical Analysis
CVE-2020-1337 is a bypass of (PrintDemon) CVE-2020-1048’s patch via a Junction Directory, made to remediate an Elevation of Privileges (EoP)\Local Privilege Escalation (LPE) vulnerability affecting the Windows’ Print Spooler Service. The vulnerability does require low privilege access and for the spooler service to restart.
The patch appeared in Microsoft’s patch Tuesday (11th August 2020) – https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-1337#ID0EWIAC.
Vulnerability description, root cause analysis and PoC code on https://voidsec.com/cve-2020-1337-printdemon-is-dead-long-live-printdemon/
Would you also like to delete your Exploited in the Wild Report?
Delete Assessment Only Delete Assessment and Exploited in the Wild ReportRatings
-
Attacker ValueVery High
-
ExploitabilityMedium
Technical Analysis
This is a print spooler vulnerability similar to CVE-2020-1048, but it uses a specially-crafted *.SHD to trigger a print to a trusted location. Introduced at Blackhat on August 6, 2020, a patch is expected to appear next week in Microsoft’s patch Tuesday.
The vulnerability does require low privilege access and for the spooler service to restart.
PoC will be uploaded to https://github.com/SafeBreach-Labs/spooler on August 12.
This is extremely valuable to attackers. The exploit is most likely present on all versions of Windows from Windows 7 to present and the race is now on to patch it while PoCs are already in the wild.
Would you also like to delete your Exploited in the Wild Report?
Delete Assessment Only Delete Assessment and Exploited in the Wild ReportCVSS V3 Severity and Metrics
General Information
Vendors
- Microsoft
Products
- Windows 10 Version 2004 for 32-bit Systems,
- Windows 10 Version 2004 for ARM64-based Systems,
- Windows 10 Version 2004 for x64-based Systems,
- Windows Server, version 2004 (Server Core installation),
- Windows 10 Version 1803 for 32-bit Systems,
- Windows 10 Version 1803 for x64-based Systems,
- Windows 10 Version 1803 for ARM64-based Systems,
- Windows 10 Version 1809 for 32-bit Systems,
- Windows 10 Version 1809 for x64-based Systems,
- Windows 10 Version 1809 for ARM64-based Systems,
- Windows Server 2019,
- Windows Server 2019 (Server Core installation),
- Windows 10 Version 1909 for 32-bit Systems,
- Windows 10 Version 1909 for x64-based Systems,
- Windows 10 Version 1909 for ARM64-based Systems,
- Windows Server, version 1909 (Server Core installation),
- Windows 10 Version 1709 for 32-bit Systems,
- Windows 10 Version 1709 for x64-based Systems,
- Windows 10 Version 1709 for ARM64-based Systems,
- Windows 10 Version 1903 for 32-bit Systems,
- Windows 10 Version 1903 for x64-based Systems,
- Windows 10 Version 1903 for ARM64-based Systems,
- Windows Server, version 1903 (Server Core installation),
- Windows 10 for 32-bit Systems,
- Windows 10 for x64-based Systems,
- Windows 10 Version 1607 for 32-bit Systems,
- Windows 10 Version 1607 for x64-based Systems,
- Windows Server 2016,
- Windows Server 2016 (Server Core installation),
- Windows 7 for 32-bit Systems Service Pack 1,
- Windows 7 for x64-based Systems Service Pack 1,
- Windows 8.1 for 32-bit systems,
- Windows 8.1 for x64-based systems,
- Windows RT 8.1,
- Windows Server 2008 for 32-bit Systems Service Pack 2,
- Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation),
- Windows Server 2008 for x64-based Systems Service Pack 2,
- Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation),
- Windows Server 2008 R2 for x64-based Systems Service Pack 1,
- Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation),
- Windows Server 2012,
- Windows Server 2012 (Server Core installation),
- Windows Server 2012 R2,
- Windows Server 2012 R2 (Server Core installation)
References
Additional Info
Technical Analysis
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: