CVE-2020-16980Improper Privilege Management in Microsoft Windows Server 2012

Severity
7.8HIGHNVD
EPSS
0.4%
top 40.19%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 16
Latest updateMay 24

Description

An elevation of privilege vulnerability exists when the Windows iSCSI Target Service improperly handles file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges. To exploit the vulnerability, an attacker would first need code execution on a victim system. An attacker could then run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows iSCSI Target Service properly handles file operations.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages13 packages

CVEListV5microsoft/windows_server_20126.2.0publication
CVEListV5microsoft/windows_server_201610.0.0publication
CVEListV5microsoft/windows_server_201910.0.0publication
CVEListV5microsoft/windows_server_2012_r26.3.0publication
CVEListV5microsoft/windows_server_version_200410.0.0publication

Patches

🔴Vulnerability Details

1
GHSA
GHSA-c85p-cp3c-gc6c: An elevation of privilege vulnerability exists when the Windows iSCSI Target Service improperly handles file operations, aka 'Windows iSCSI Target Ser2022-05-24

📋Vendor Advisories

1
Microsoft
Windows iSCSI Target Service Elevation of Privilege Vulnerability2020-10-13
CVE-2020-16980 — Improper Privilege Management | cvebase