CVE-2020-12320

7.8 HIGH

📋 TL;DR

This vulnerability in Intel SCS Add-on for Microsoft SCCM allows authenticated local users to escalate privileges by manipulating the search path. It affects organizations using Intel SCS Add-on versions before 2.1.10 with SCCM. Attackers could gain higher system permissions if they have initial access.

💻 Affected Systems

Products:
  • Intel(R) SCS Add-on for Microsoft SCCM
Versions: Versions before 2.1.10
Operating Systems: Windows (as it integrates with Microsoft SCCM)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires SCCM environment; vulnerability is present in default installations of the add-on.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker gains full administrative control over the system, potentially compromising the entire SCCM environment and deploying malicious software.

🟠

Likely Case

A malicious insider or compromised account escalates privileges to install backdoors, steal sensitive data, or move laterally within the network.

🟢

If Mitigated

With strict access controls and patching, impact is limited to isolated systems with minimal data exposure.

🌐 Internet-Facing: LOW, as exploitation requires local authenticated access, not directly accessible from the internet.
🏢 Internal Only: HIGH, because internal users or compromised accounts can exploit it to escalate privileges within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW, as it involves path manipulation by authenticated users.

Exploitation likely requires local access and basic user privileges; no public exploits known as of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.1.10

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00413

Restart Required: Yes

Instructions:

1. Download Intel SCS Add-on version 2.1.10 from Intel's official site. 2. Install the update on all affected SCCM servers. 3. Restart the servers to apply changes. 4. Verify installation via version check.

🔧 Temporary Workarounds

Restrict Local User Permissions

windows

Limit local user access to directories that could be manipulated in the search path to reduce attack surface.

Use Windows Group Policy to enforce strict file permissions and access controls.

🧯 If You Can't Patch

  • Implement least privilege access controls to minimize the number of users with local authentication.
  • Monitor and audit local user activities for suspicious behavior related to file path manipulation.

🔍 How to Verify

Check if Vulnerable:

Check the installed version of Intel SCS Add-on via SCCM console or by running 'sc query' for related services and verifying version numbers.

Check Version:

In Windows, check the program version in Control Panel > Programs and Features, or use PowerShell: Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*Intel SCS Add-on*'} | Select-Object Name, Version

Verify Fix Applied:

Confirm that Intel SCS Add-on version is 2.1.10 or higher using the same version check methods.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access or creation in system directories by authenticated users
  • Failed or successful privilege escalation attempts in Windows Event Logs (e.g., Event ID 4688).

Network Indicators:

  • None specific, as this is a local privilege escalation vulnerability.

SIEM Query:

Example for Splunk: index=windows EventCode=4688 | search "Intel SCS" OR "path manipulation" | stats count by user, process

🔗 References

📤 Share & Export