CVE-2020-11799
📋 TL;DR
CVE-2020-11799 is a privilege escalation vulnerability in Z-Cron that allows unprivileged users to modify privileged users' scheduled tasks. This can lead to complete system compromise by executing arbitrary code with elevated privileges. All users on affected systems are potentially impacted.
💻 Affected Systems
- Z-Cron
📦 What is this software?
Z Cron by Z Cron
⚠️ Risk & Real-World Impact
Worst Case
Complete system takeover with administrative privileges, allowing attackers to install malware, steal data, or pivot to other systems.
Likely Case
Local privilege escalation leading to unauthorized administrative access and potential lateral movement within the network.
If Mitigated
Limited impact if proper access controls and monitoring are in place to detect unauthorized task modifications.
🎯 Exploit Status
Exploitation requires local user access but is straightforward once access is obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Later versions of Z-Cron 5.6
Vendor Advisory: https://blog.spookysec.net/zcron/
Restart Required: Yes
Instructions:
1. Download latest Z-Cron version from official vendor. 2. Uninstall current version. 3. Install updated version. 4. Restart system.
🔧 Temporary Workarounds
Restrict Task File Permissions
windowsModify file system permissions to prevent unprivileged users from writing to Z-Cron task directories.
icacls "C:\Program Files\Z-Cron\Tasks" /deny Users:(OI)(CI)W
Disable Z-Cron Service
windowsTemporarily disable the Z-Cron service if not critically needed.
sc stop ZCronService
sc config ZCronService start= disabled
🧯 If You Can't Patch
- Implement strict access controls to limit who can log into systems running Z-Cron
- Monitor for unauthorized modifications to Z-Cron task files and scheduled tasks
🔍 How to Verify
Check if Vulnerable:
Check Z-Cron version in About dialog or registry: HKEY_LOCAL_MACHINE\SOFTWARE\Z-Cron\Version
Check Version:
reg query "HKLM\SOFTWARE\Z-Cron" /v Version
Verify Fix Applied:
Verify version is updated beyond 5.6 Build 04 and test if unprivileged users can modify task files.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized modifications to Z-Cron task files
- Unexpected scheduled task creation/modification events
Network Indicators:
- Unusual outbound connections from Z-Cron service
SIEM Query:
EventID=4688 AND ProcessName LIKE '%zcron%' AND CommandLine CONTAINS 'suspicious'