An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system, aka ‘Windows Print Spooler Elevation of Privilege Vulnerability’.
Recent assessments:
VoidSec at August 11, 2020 8:19am UTC reported:
CVE-2020-1337 is a bypass of (PrintDemon) CVE-2020-1048’s patch via a Junction Directory, made to remediate an Elevation of Privileges (EoP)\Local Privilege Escalation (LPE) vulnerability affecting the Windows’ Print Spooler Service. The vulnerability does require low privilege access and for the spooler service to restart.
The patch appeared in Microsoft’s patch Tuesday (11th August 2020) – <https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-1337#ID0EWIAC>.
Vulnerability description, root cause analysis and PoC code on <https://voidsec.com/cve-2020-1337-printdemon-is-dead-long-live-printdemon/>
bwatters-r7 at August 06, 2020 6:40pm UTC reported:
CVE-2020-1337 is a bypass of (PrintDemon) CVE-2020-1048’s patch via a Junction Directory, made to remediate an Elevation of Privileges (EoP)\Local Privilege Escalation (LPE) vulnerability affecting the Windows’ Print Spooler Service. The vulnerability does require low privilege access and for the spooler service to restart.
The patch appeared in Microsoft’s patch Tuesday (11th August 2020) – <https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-1337#ID0EWIAC>.
Vulnerability description, root cause analysis and PoC code on <https://voidsec.com/cve-2020-1337-printdemon-is-dead-long-live-printdemon/>
Assessed Attacker Value: 5
Assessed Attacker Value: 5Assessed Attacker Value: 4