// For flags

CVE-2020-3427

Duo Authentication for Windows Logon and RDP Privilege Escalation Vulnerability

Severity Score

7.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

The Windows Logon installer prior to 4.1.2 did not properly validate file installation paths. This allows an attacker with local user privileges to coerce the installer to write to arbitrary privileged directories. If successful, an attacker can manipulate files used by Windows Logon, cause Denial of Service (DoS) by deleting file(s), or replace system files to potentially achieve elevation of privileges. Note that this can only exploitable during new installations while the installer is running and is not exploitable once installation is finished. Versions 4.1.2 of Windows Logon addresses this issue.

El instalador de Windows Logon en versiones anteriores a 4.1.2 no validó correctamente las rutas de instalación de los archivos. Esto permite que un atacante con privilegios de usuario local pueda coaccionar al instalador para que escriba en directorios privilegiados arbitrarios. Si tiene éxito, un atacante puede manipular los archivos utilizados por Windows Logon, causar una denegación de servicio (DoS) mediante la eliminación de archivos o sustituir los archivos del sistema para lograr potencialmente la elevación de los privilegios. Tenga en cuenta que esto sólo se puede explotar durante las nuevas instalaciones mientras el instalador se está ejecutando y no se puede explotar una vez finalizada la instalación. La versión 4.1.2 de Windows Logon soluciona este problema

*Credits: This issue was reported by Ido Hoorvitch from CyberArk
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2019-12-12 CVE Reserved
  • 2020-10-14 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-11-13 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-280: Improper Handling of Insufficient Permissions or Privileges
CAPEC
References (1)
URL Tag Source
URL Date SRC
URL Date SRC
URL Date SRC
https://duo.com/docs/rdp-notes 2022-09-20
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Duo Authentication For Windows Logon And Rdp
Search vendor "Cisco" for product "Duo Authentication For Windows Logon And Rdp"
< 4.1.2
Search vendor "Cisco" for product "Duo Authentication For Windows Logon And Rdp" and version " < 4.1.2"
-
Affected