Learn about CVE-2020-36154, a vulnerability in Pearson VUE VTS Installer 2.3.1911 that allows local users to gain administrative privileges. Find mitigation steps and prevention measures here.
The Application Wrapper in Pearson VUE VTS Installer 2.3.1911 has Full Control permissions for Everyone in the "%SYSTEMDRIVE%\Pearson VUE" directory, allowing local users to gain administrative privileges via a Trojan horse application.
Understanding CVE-2020-36154
This CVE identifies a vulnerability in the Pearson VUE VTS Installer that can lead to privilege escalation on the system.
What is CVE-2020-36154?
The Application Wrapper in Pearson VUE VTS Installer 2.3.1911 grants Full Control permissions to Everyone in a specific directory, enabling local users to elevate their privileges using a malicious application.
The Impact of CVE-2020-36154
This vulnerability can be exploited by local users to gain administrative privileges on the affected system, potentially leading to unauthorized access and control.
Technical Details of CVE-2020-36154
The following technical details outline the specifics of this CVE.
Vulnerability Description
The Application Wrapper in Pearson VUE VTS Installer 2.3.1911 provides Full Control permissions for Everyone in the designated directory, facilitating privilege escalation through a malicious application.
Affected Systems and Versions
Exploitation Mechanism
Local users can exploit this vulnerability by placing a Trojan horse application in the "%SYSTEMDRIVE%\Pearson VUE" directory, leveraging the Full Control permissions to gain administrative privileges.
Mitigation and Prevention
Protect your systems from CVE-2020-36154 with the following mitigation strategies.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Ensure that you apply any security patches or updates released by Pearson VUE to address this vulnerability.