Very High
CVE-2020-1337
Add Reference
Description
URL
Type
CVE-2020-1337
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Description
An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system, aka ‘Windows Print Spooler Elevation of Privilege Vulnerability’.
Add Assessment
Ratings
-
Attacker ValueVery High
-
ExploitabilityHigh
Technical Analysis
CVE-2020-1337 is a bypass of (PrintDemon) CVE-2020-1048’s patch via a Junction Directory, made to remediate an Elevation of Privileges (EoP)\Local Privilege Escalation (LPE) vulnerability affecting the Windows’ Print Spooler Service. The vulnerability does require low privilege access and for the spooler service to restart.
The patch appeared in Microsoft’s patch Tuesday (11th August 2020) – https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-1337#ID0EWIAC.
Vulnerability description, root cause analysis and PoC code on https://voidsec.com/cve-2020-1337-printdemon-is-dead-long-live-printdemon/
Ratings
-
Attacker ValueVery High
-
ExploitabilityMedium
Technical Analysis
This is a print spooler vulnerability similar to CVE-2020-1048, but it uses a specially-crafted *.SHD to trigger a print to a trusted location. Introduced at Blackhat on August 6, 2020, a patch is expected to appear next week in Microsoft’s patch Tuesday.
The vulnerability does require low privilege access and for the spooler service to restart.
PoC will be uploaded to https://github.com/SafeBreach-Labs/spooler on August 12.
This is extremely valuable to attackers. The exploit is most likely present on all versions of Windows from Windows 7 to present and the race is now on to patch it while PoCs are already in the wild.
CVSS V3 Severity and Metrics
General Information
Vendors
- Microsoft
Products
- Windows 10 Version 2004 for 32-bit Systems,
- Windows 10 Version 2004 for ARM64-based Systems,
- Windows 10 Version 2004 for x64-based Systems,
- Windows Server, version 2004 (Server Core installation),
- Windows 10 Version 1803 for 32-bit Systems,
- Windows 10 Version 1803 for x64-based Systems,
- Windows 10 Version 1803 for ARM64-based Systems,
- Windows 10 Version 1809 for 32-bit Systems,
- Windows 10 Version 1809 for x64-based Systems,
- Windows 10 Version 1809 for ARM64-based Systems,
- Windows Server 2019,
- Windows Server 2019 (Server Core installation),
- Windows 10 Version 1909 for 32-bit Systems,
- Windows 10 Version 1909 for x64-based Systems,
- Windows 10 Version 1909 for ARM64-based Systems,
- Windows Server, version 1909 (Server Core installation),
- Windows 10 Version 1709 for 32-bit Systems,
- Windows 10 Version 1709 for x64-based Systems,
- Windows 10 Version 1709 for ARM64-based Systems,
- Windows 10 Version 1903 for 32-bit Systems,
- Windows 10 Version 1903 for x64-based Systems,
- Windows 10 Version 1903 for ARM64-based Systems,
- Windows Server, version 1903 (Server Core installation),
- Windows 10 for 32-bit Systems,
- Windows 10 for x64-based Systems,
- Windows 10 Version 1607 for 32-bit Systems,
- Windows 10 Version 1607 for x64-based Systems,
- Windows Server 2016,
- Windows Server 2016 (Server Core installation),
- Windows 7 for 32-bit Systems Service Pack 1,
- Windows 7 for x64-based Systems Service Pack 1,
- Windows 8.1 for 32-bit systems,
- Windows 8.1 for x64-based systems,
- Windows RT 8.1,
- Windows Server 2008 for 32-bit Systems Service Pack 2,
- Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation),
- Windows Server 2008 for x64-based Systems Service Pack 2,
- Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation),
- Windows Server 2008 R2 for x64-based Systems Service Pack 1,
- Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation),
- Windows Server 2012,
- Windows Server 2012 (Server Core installation),
- Windows Server 2012 R2,
- Windows Server 2012 R2 (Server Core installation)
References
Additional Info
Technical Analysis
Report as Exploited in the Wild
What do we mean by "exploited in the wild"?
By selecting this, you are verifying to the AttackerKB community that either you, or a reputable source (example: a security vendor or researcher), has observed an active attempt by attackers, or IOCs related, to exploit this vulnerability outside of a research environment.
A vulnerability should also be considered "exploited in the wild" if there is a publicly available PoC or exploit (example: in an exploitation framework like Metasploit).