CVE-2020-1113
Microsoft Windows Task Scheduler Security Feature Bypass
Severity Score
Exploit Likelihood
Affected Versions
23Public Exploits
1Exploited in Wild
-Decision
Descriptions
A security feature bypass vulnerability exists in Microsoft Windows when the Task Scheduler service fails to properly verify client connections over RPC, aka 'Windows Task Scheduler Security Feature Bypass Vulnerability'.
Se presenta una vulnerabilidad de omisión de la característica de seguridad en Microsoft Windows cuando el servicio Task Scheduler presenta un fallo al verificar apropiadamente las conexiones del cliente por medio de una RPC, también se conoce como "Windows Task Scheduler Security Feature Bypass Vulnerability".
Compass Security identified a security feature bypass vulnerability in Microsoft Windows. Due to the absence of integrity verification requirements for the RPC protocol and in particular the Task Scheduler, a man-in-the-middle attacker can relay his victim's NTLM authentication to a target of his choice over the RPC protocol. Provided the victim has administrative privileges on the target, the attacker can execute code on the remote target.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-11-04 CVE Reserved
- 2020-05-15 CVE Published
- 2020-05-15 First Exploit
- 2023-03-07 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-295: Improper Certificate Validation
CAPEC
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|