CVE-2020-1337

Scores

EPSS

0.553medium55.3%
0%20%40%60%80%100%

Percentile: 55.3%

CVSS

7.8high3.x
0246810

CVSS Score: 7.8/10

All CVSS Scores

CVSS 3.x
7.8

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0
7.2

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Description

An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted script or application.
The update addresses the vulnerability by correcting how the Windows Print Spooler Component writes to the file system.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

msrcnvd

CWEs

CWE-367

Related Vulnerabilities

Exploits

Exploit ID: CVE-2020-1337

Source: github-poc

URL: https://github.com/sailay1996/cve-2020-1337-poc

Vulnerable Software (30)

Type: Configuration

Vendor: *

Product: windows_10

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"...

Source: nvd

Type: Configuration

Vendor: *

Product: windows_7

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"...

Source: nvd

Type: Configuration

Vendor: *

Product: windows_8.1

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"...

Source: nvd

Type: Configuration

Vendor: *

Product: windows_rt_8.1

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"...

Source: nvd

Type: Configuration

Vendor: *

Product: windows_server_2008

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"...

Source: nvd

Type: Configuration

Vendor: *

Product: windows_server_2012

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"...

Source: nvd

Type: Configuration

Vendor: *

Product: windows_server_2016

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"...

Source: nvd

Type: Configuration

Vendor: *

Product: windows_server_2019

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"...

Source: nvd

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB4571729

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 17763.1397

Operating System: Windows 17763 build 1397

Identifier: KB4565349

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 17134.1667

Operating System: Windows 17134 build 1667

Identifier: KB4571709

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 19041.450

Operating System: Windows 19041 build 450

Identifier: KB4566782

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB4571703

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB4571723

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB4577066

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB4578013

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB4571736

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB4571702

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB4577038

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB4571730

Source: msrc