An elevation of privilege vulnerability exists when the Windows Update Orchestrator Service improperly handles file operations, aka 'Windows Update Orchestrator Service Elevation of Privilege Vulnerability'.
Published 2020-06-09 20:15:21
Updated 2022-04-28 19:33:00
View at NVD,   CVE.org
Vulnerability category: Gain privilege

Products affected by CVE-2020-1313

Exploit prediction scoring system (EPSS) score for CVE-2020-1313

90.52%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less

Metasploit modules for CVE-2020-1313

  • Windows Update Orchestrator unchecked ScheduleWork call
    Disclosure Date: 2019-11-04
    First seen: 2020-09-25
    exploit/windows/local/cve_2020_1313_system_orchestrator
    This exploit uses access to the UniversalOrchestrator ScheduleWork API call which does not verify the caller's token before scheduling a job to be run as SYSTEM. You cannot schedule something in a given time, so the payload will execute as system sometime in

CVSS scores for CVE-2020-1313

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
6.8
MEDIUM AV:N/AC:M/Au:N/C:P/I:P/A:P
8.6
6.4
NIST
7.8
HIGH CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1.8
5.9
NIST

References for CVE-2020-1313

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!