CVE-2020-0986

7.8 HIGH

📋 TL;DR

This Windows kernel vulnerability allows attackers to gain elevated privileges by exploiting improper memory object handling. It affects Windows systems where an attacker already has limited local access and can execute code. Successful exploitation enables privilege escalation from a lower-privileged account to SYSTEM-level access.

💻 Affected Systems

Products:
  • Microsoft Windows
Versions: Windows 10 versions 1903, 1909, and 2004; Windows Server 2019; Windows Server, version 1903; Windows Server, version 1909
Operating Systems: Windows 10, Windows Server 2019
Default Config Vulnerable: ⚠️ Yes
Notes: Affects 32-bit applications running on 64-bit Windows systems via the splWOW64 component. Requires local access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, enabling installation of persistent malware, credential theft, lateral movement, and disabling of security controls.

🟠

Likely Case

Local privilege escalation from a standard user or service account to SYSTEM privileges, allowing attackers to bypass security restrictions and maintain persistence.

🟢

If Mitigated

Limited impact if proper patch management and least privilege principles are enforced, though initial foothold could still lead to escalation.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring initial access to the system.
🏢 Internal Only: HIGH - Once an attacker gains initial access to a Windows system, this vulnerability enables privilege escalation to SYSTEM, facilitating lateral movement and persistence.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit code is publicly available and has been used in real attacks. Requires local code execution privileges to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: May 2020 security updates (KB4556799 for Windows 10 1903/1909, KB4551853 for Windows 10 2004)

Vendor Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0986

Restart Required: Yes

Instructions:

1. Apply the May 2020 Windows security updates through Windows Update. 2. For enterprise environments, deploy updates via WSUS, SCCM, or equivalent patch management system. 3. Restart affected systems after patch installation.

🔧 Temporary Workarounds

Disable splWOW64 service

windows

Disables the splWOW64 service which is involved in the vulnerability, but may break 32-bit printing functionality

sc config splwow64 start= disabled
sc stop splwow64

🧯 If You Can't Patch

  • Implement strict least privilege principles to limit initial access opportunities
  • Monitor for suspicious process creation and privilege escalation attempts using EDR solutions

🔍 How to Verify

Check if Vulnerable:

Check Windows version and if May 2020 security updates are installed. Vulnerable if running affected versions without KB4556799 or KB4551853.

Check Version:

wmic os get caption,version,buildnumber

Verify Fix Applied:

Verify that KB4556799 (for Windows 10 1903/1909) or KB4551853 (for Windows 10 2004) is installed via 'wmic qfe list' or 'Get-Hotfix' in PowerShell.

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4688: Process creation with parent-child privilege escalation patterns
  • Suspicious splwow64.exe process behavior
  • Unexpected SYSTEM privilege acquisition

Network Indicators:

  • Not applicable - local privilege escalation only

SIEM Query:

EventID=4688 AND (NewProcessName="*splwow64*" OR ParentProcessName="*splwow64*") AND TokenElevationType="%%1938"

🔗 References

📤 Share & Export