CVE-2020-14418
 
Severity Score
7.0
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
1
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
A TOCTOU vulnerability exists in madCodeHook before 2020-07-16 that allows local attackers to elevate their privileges to SYSTEM. This occurs because path redirection can occur via vectors involving directory junctions.
Se presenta una vulnerabilidad TOCTOU en madCodeHook antes del 16-07-2020, que permite a atacantes locales elevar sus privilegios a SYSTEM. Esto ocurre porque el redireccionamiento de ruta puede ocurrir por medio de vectores que involucran uniones de directorio
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2020-06-18 CVE Reserved
- 2021-01-30 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://github.com/nettitude/metasploit-modules | Product |
URL | Date | SRC |
---|---|---|
https://labs.nettitude.com/blog/cve-2020-14418-madcodehook-library-local-privilege-escalation | 2024-08-04 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Advanced Malware Protection Search vendor "Cisco" for product "Advanced Malware Protection" | < 7.2.13 Search vendor "Cisco" for product "Advanced Malware Protection" and version " < 7.2.13" | - |
Affected
| ||||||
Madshi Search vendor "Madshi" | Madcodehook Search vendor "Madshi" for product "Madcodehook" | < 4.1.3 Search vendor "Madshi" for product "Madcodehook" and version " < 4.1.3" | - |
Affected
| ||||||
Morphisec Search vendor "Morphisec" | Unified Threat Prevention Platform Search vendor "Morphisec" for product "Unified Threat Prevention Platform" | < 3.5.9 Search vendor "Morphisec" for product "Unified Threat Prevention Platform" and version " < 3.5.9" | - |
Affected
| ||||||
Morphisec Search vendor "Morphisec" | Unified Threat Prevention Platform Search vendor "Morphisec" for product "Unified Threat Prevention Platform" | >= 4.0 < 4.1.2 Search vendor "Morphisec" for product "Unified Threat Prevention Platform" and version " >= 4.0 < 4.1.2" | - |
Affected
|