Discover how CVE-2020-12613 in BeyondTrust Privilege Management for Windows allows attackers to retain access post-process elevation. Learn mitigation steps here.
BeyondTrust Privilege Management for Windows through 5.6 allows an attacker to retain access and permissions after a process elevation.
Understanding CVE-2020-12613
An issue in BeyondTrust Privilege Management for Windows allows an attacker to maintain access privileges post-process elevation.
What is CVE-2020-12613?
The vulnerability in BeyondTrust Privilege Management for Windows enables an attacker to retain access and permissions even after a process elevation by Avecto.
The Impact of CVE-2020-12613
This vulnerability can lead to unauthorized access and potential misuse of elevated privileges, posing a significant security risk to affected systems.
Technical Details of CVE-2020-12613
BeyondTrust Privilege Management for Windows through version 5.6 is susceptible to this privilege escalation vulnerability.
Vulnerability Description
Affected Systems and Versions
Exploitation Mechanism
The attacker can exploit this vulnerability by spawning a process with multiple users in the security token before Avecto elevation, enabling the retention of access post-elevation.
Mitigation and Prevention
Immediate Steps to Take: