CVE-2020-0730Link Following in Microsoft Windows

CWE-59Link Following6 documents5 sources
Severity
7.1HIGHNVD
EPSS
0.6%
top 31.38%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 11
Latest updateMay 24

Description

An elevation of privilege vulnerability exists when the Windows User Profile Service (ProfSvc) improperly handles symlinks, aka 'Windows User Profile Service Elevation of Privilege Vulnerability'.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:HExploitability: 1.8 | Impact: 5.2

Affected Packages10 packages

CVEListV5microsoft/windows18 versions+17
NVDmicrosoft/windows4 versions+3
NVDmicrosoft/windows_106 versions+5
CVEListV5microsoft/windows_server17 versions+16

Patches

🔴Vulnerability Details

2
GHSA
GHSA-f3x7-c8j2-3m8w: An elevation of privilege vulnerability exists when the Windows User Profile Service (ProfSvc) improperly handles symlinks, aka 'Windows User Profile2022-05-24
CVEList
CVE-2020-0730: An elevation of privilege vulnerability exists when the Windows User Profile Service (ProfSvc) improperly handles symlinks, aka 'Windows User Profile2020-02-11

📋Vendor Advisories

1
Microsoft
Windows User Profile Service Elevation of Privilege Vulnerability2020-02-11

🕵️Threat Intelligence

2
Talos
Microsoft Patch Tuesday — Feb. 2020: Vulnerability disclosures and Snort coverage2020-02-11
Talos
Microsoft Patch Tuesday — Feb. 2020: Vulnerability disclosures and Snort coverage2020-02-11
CVE-2020-0730 — Link Following in Microsoft Windows | cvebase