605
VMScore

CVE-2020-1313

Published: 09/06/2020 Updated: 28/04/2022
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

An elevation of privilege vulnerability exists when the Windows Update Orchestrator Service improperly handles file operations, aka 'Windows Update Orchestrator Service Elevation of Privilege Vulnerability'.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows server 2016 1903

microsoft windows 10 1903

microsoft windows server 2016 1909

microsoft windows 10 1909

microsoft windows 10 2004

microsoft windows server 2016 2004

Exploits

This Metasploit module exploit uses access to the UniversalOrchestrator ScheduleWork API call which does not verify the caller's token before scheduling a job to be run as SYSTEM You cannot schedule something in a given time, so the payload will execute as system sometime in the next 24 hours ...

Github Repositories

Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability

CVE-2020-1313 Abstract Windows Update Orchestrator Service is a DCOM service used by other components to install windows updates that are already downloaded USO was vulnerable to Elevation of Privileges (any user to local system) due to an improper authorization of the callers The vulnerability affected the Windows 10 and Windows Server Core products Fixed by Microsoft on Pa