Vulnerability Details : CVE-2020-12612
An issue was discovered in BeyondTrust Privilege Management for Windows through 5.6. When specifying a program to elevate, it can typically be found within the Program Files (x86) folder and therefore uses the %ProgramFiles(x86)% environment variable. However, when this same policy gets pushed to a 32bit machine, this environment variable does not exist. Therefore, since the standard user can create a user level environment variable, they can repoint this variable to any folder the user has full control of. Then, the folder structure can be created in such a way that a rule matches and arbitrary code runs elevated.
Products affected by CVE-2020-12612
- cpe:2.3:a:beyondtrust:privilege_management_for_windows:*:*:*:*:*:*:*:*
- cpe:2.3:a:beyondtrust:privilege_management_for_windows:5.6:-:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-12612
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 7 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-12612
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
References for CVE-2020-12612
-
https://www.beyondtrust.com/trust-center/security-advisories/bt22-09
BT22-09 | BeyondTrustVendor Advisory
-
https://www.beyondtrust.com/support/changelog/privilege-management-for-windows-5-6-sr1
Release Notes
Jump to