Vulnerability Details : CVE-2020-24307
An issue in mRemoteNG v1.76.20 allows attackers to escalate privileges via a crafted executable file. NOTE: third parties were unable to reproduce any scenario in which the claimed access of BUILTIN\Users:(M) is present.
Products affected by CVE-2020-24307
- cpe:2.3:a:mremoteng:mremoteng:1.76.20:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-24307
0.03%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 4 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-24307
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2020-24307
-
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-24307
-
https://github.com/NyaMeeEain/Infrastructure-Assessment/blob/master/Privilege%20Escalation/Common%20Windows%20Privilege%20Escalation.md
Infrastructure-Assessment/Common Windows Privilege Escalation.md at master · NyaMeeEain/Infrastructure-Assessment · GitHubNot Applicable
-
https://github.com/mRemoteNG/mRemoteNG/issues/2338
Exploit for mRemoteNG 1.76.20 Privilege Escalation CVE-2020-24307 · Issue #2338 · mRemoteNG/mRemoteNG · GitHub
-
https://packetstormsecurity.com/files/170794/mRemoteNG-1.76.20-Privilege-Escalation.html
mRemoteNG 1.76.20 Privilege Escalation ≈ Packet StormThird Party Advisory;VDB Entry
Jump to