An issue was discovered in BeyondTrust Privilege Management for Windows through 5.6. When specifying a program to elevate, it can typically be found within the Program Files (x86) folder and therefore uses the %ProgramFiles(x86)% environment variable. However, when this same policy gets pushed to a 32bit machine, this environment variable does not exist. Therefore, since the standard user can create a user level environment variable, they can repoint this variable to any folder the user has full control of. Then, the folder structure can be created in such a way that a rule matches and arbitrary code runs elevated.
References
Link | Resource |
---|---|
https://www.beyondtrust.com/support/changelog/privilege-management-for-windows-5-6-sr1 | Release Notes |
https://www.beyondtrust.com/trust-center/security-advisories/bt22-09 | Vendor Advisory |
https://www.beyondtrust.com/support/changelog/privilege-management-for-windows-5-6-sr1 | Release Notes |
https://www.beyondtrust.com/trust-center/security-advisories/bt22-09 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:59
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.beyondtrust.com/support/changelog/privilege-management-for-windows-5-6-sr1 - Release Notes | |
References | () https://www.beyondtrust.com/trust-center/security-advisories/bt22-09 - Vendor Advisory |
15 Dec 2023, 16:24
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-12 14:15
Updated : 2024-11-21 04:59
NVD link : CVE-2020-12612
Mitre link : CVE-2020-12612
CVE.ORG link : CVE-2020-12612
JSON object : View
Products Affected
beyondtrust
- privilege_management_for_windows
CWE