Lucene search

K
attackerkbAttackerKBAKB:A445D23E-9B9D-431C-B9B3-46FB8149EF78
HistoryAug 17, 2020 - 12:00 a.m.

CVE-2020-1337

2020-08-1700:00:00
attackerkb.com
115

0.006 Low

EPSS

Percentile

79.4%

An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system, aka ‘Windows Print Spooler Elevation of Privilege Vulnerability’.

Recent assessments:

VoidSec at August 11, 2020 8:19am UTC reported:

CVE-2020-1337 is a bypass of (PrintDemon) CVE-2020-1048’s patch via a Junction Directory, made to remediate an Elevation of Privileges (EoP)\Local Privilege Escalation (LPE) vulnerability affecting the Windows’ Print Spooler Service. The vulnerability does require low privilege access and for the spooler service to restart.
The patch appeared in Microsoft’s patch Tuesday (11th August 2020) – <https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-1337#ID0EWIAC&gt;.

Vulnerability description, root cause analysis and PoC code on <https://voidsec.com/cve-2020-1337-printdemon-is-dead-long-live-printdemon/&gt;

bwatters-r7 at August 06, 2020 6:40pm UTC reported:

CVE-2020-1337 is a bypass of (PrintDemon) CVE-2020-1048’s patch via a Junction Directory, made to remediate an Elevation of Privileges (EoP)\Local Privilege Escalation (LPE) vulnerability affecting the Windows’ Print Spooler Service. The vulnerability does require low privilege access and for the spooler service to restart.
The patch appeared in Microsoft’s patch Tuesday (11th August 2020) – <https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-1337#ID0EWIAC&gt;.

Vulnerability description, root cause analysis and PoC code on <https://voidsec.com/cve-2020-1337-printdemon-is-dead-long-live-printdemon/&gt;

Assessed Attacker Value: 5
Assessed Attacker Value: 5Assessed Attacker Value: 4