ID

VAR-202010-1014


CVE

CVE-2020-3427


TITLE

Windows Logon installer  Vulnerability in handling exceptional conditions in

Trust: 0.8

sources: JVNDB: JVNDB-2020-012744

DESCRIPTION

The Windows Logon installer prior to 4.1.2 did not properly validate file installation paths. This allows an attacker with local user privileges to coerce the installer to write to arbitrary privileged directories. If successful, an attacker can manipulate files used by Windows Logon, cause Denial of Service (DoS) by deleting file(s), or replace system files to potentially achieve elevation of privileges. Note that this can only exploitable during new installations while the installer is running and is not exploitable once installation is finished. Versions 4.1.2 of Windows Logon addresses this issue. Windows Logon installer Is vulnerable to handling exceptional conditions.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Duo Network Gateway (DNG) is an access control software developed by Duo Corporation in the United States for accessing internal web applications. The Duo Authentication Windows Logon and RDP implementation has a security vulnerability that stems from a privilege escalation vulnerability in the two-factor authentication implemented

Trust: 1.8

sources: NVD: CVE-2020-3427 // JVNDB: JVNDB-2020-012744 // VULHUB: VHN-181552 // VULMON: CVE-2020-3427

AFFECTED PRODUCTS

vendor:ciscomodel:duo authentication for windows logon and rdpscope:ltversion:4.1.2

Trust: 1.0

vendor:シスコシステムズmodel:duo authentication for windows logon and rdpscope:eqversion: -

Trust: 0.8

vendor:シスコシステムズmodel:duo authentication for windows logon and rdpscope:eqversion:4.1.2

Trust: 0.8

sources: JVNDB: JVNDB-2020-012744 // NVD: CVE-2020-3427

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-3427
value: HIGH

Trust: 1.0

ykramarz@cisco.com: CVE-2020-3427
value: MEDIUM

Trust: 1.0

NVD: CVE-2020-3427
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202010-633
value: HIGH

Trust: 0.6

VULHUB: VHN-181552
value: MEDIUM

Trust: 0.1

VULMON: CVE-2020-3427
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-3427
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-181552
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-3427
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

ykramarz@cisco.com: CVE-2020-3427
baseSeverity: MEDIUM
baseScore: 6.6
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 1.3
impactScore: 5.2
version: 3.1

Trust: 1.0

NVD: CVE-2020-3427
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-181552 // VULMON: CVE-2020-3427 // JVNDB: JVNDB-2020-012744 // CNNVD: CNNVD-202010-633 // NVD: CVE-2020-3427 // NVD: CVE-2020-3427

PROBLEMTYPE DATA

problemtype:CWE-280

Trust: 1.0

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:Improper handling in exceptional conditions (CWE-755) [NVD Evaluation ]

Trust: 0.8

problemtype:CWE-755

Trust: 0.1

sources: VULHUB: VHN-181552 // JVNDB: JVNDB-2020-012744 // NVD: CVE-2020-3427

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202010-633

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202010-633

PATCH

title:Duo Authentication for Windows Logon and RDP - Release Notesurl:https://duo.com/docs/rdp-notes

Trust: 0.8

title:Microsoft Windows Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=131280

Trust: 0.6

sources: JVNDB: JVNDB-2020-012744 // CNNVD: CNNVD-202010-633

EXTERNAL IDS

db:NVDid:CVE-2020-3427

Trust: 2.6

db:JVNDBid:JVNDB-2020-012744

Trust: 0.8

db:CNNVDid:CNNVD-202010-633

Trust: 0.7

db:VULHUBid:VHN-181552

Trust: 0.1

db:VULMONid:CVE-2020-3427

Trust: 0.1

sources: VULHUB: VHN-181552 // VULMON: CVE-2020-3427 // JVNDB: JVNDB-2020-012744 // CNNVD: CNNVD-202010-633 // NVD: CVE-2020-3427

REFERENCES

url:https://duo.com/docs/rdp-notes

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-3427

Trust: 1.4

url:https://cwe.mitre.org/data/definitions/755.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/189806

Trust: 0.1

sources: VULHUB: VHN-181552 // VULMON: CVE-2020-3427 // JVNDB: JVNDB-2020-012744 // CNNVD: CNNVD-202010-633 // NVD: CVE-2020-3427

SOURCES

db:VULHUBid:VHN-181552
db:VULMONid:CVE-2020-3427
db:JVNDBid:JVNDB-2020-012744
db:CNNVDid:CNNVD-202010-633
db:NVDid:CVE-2020-3427

LAST UPDATE DATE

2024-11-23T22:33:16.492000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-181552date:2022-09-20T00:00:00
db:VULMONid:CVE-2020-3427date:2020-10-30T00:00:00
db:JVNDBid:JVNDB-2020-012744date:2021-05-26T07:19:00
db:CNNVDid:CNNVD-202010-633date:2022-09-21T00:00:00
db:NVDid:CVE-2020-3427date:2024-11-21T05:31:02.883

SOURCES RELEASE DATE

db:VULHUBid:VHN-181552date:2020-10-14T00:00:00
db:VULMONid:CVE-2020-3427date:2020-10-14T00:00:00
db:JVNDBid:JVNDB-2020-012744date:2021-05-26T00:00:00
db:CNNVDid:CNNVD-202010-633date:2020-10-14T00:00:00
db:NVDid:CVE-2020-3427date:2020-10-14T19:15:13.977