CVE-2020-12613
📋 TL;DR
This vulnerability in BeyondTrust Privilege Management for Windows allows attackers to bypass privilege elevation controls. An attacker can spawn a process with multiple user tokens, and when the Avecto component elevates the process, it fails to remove secondary users, allowing unauthorized privilege retention. This affects organizations using BeyondTrust Privilege Management for Windows up to version 5.6.
💻 Affected Systems
- BeyondTrust Privilege Management for Windows
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete privilege escalation where attackers gain persistent administrative access to Windows systems, potentially leading to full domain compromise.
Likely Case
Local privilege escalation allowing attackers to bypass security controls and execute code with elevated privileges.
If Mitigated
Limited impact with proper network segmentation, least privilege principles, and monitoring in place.
🎯 Exploit Status
Exploitation requires local access and understanding of Windows security tokens and process spawning.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.6 SR1 and later
Vendor Advisory: https://www.beyondtrust.com/trust-center/security-advisories/bt22-11
Restart Required: Yes
Instructions:
1. Download BeyondTrust Privilege Management for Windows 5.6 SR1 or later from BeyondTrust support portal. 2. Install the update following vendor documentation. 3. Restart affected systems to ensure proper application of security fixes.
🔧 Temporary Workarounds
Disable Avecto Privilege Elevation
windowsTemporarily disable the vulnerable Avecto privilege elevation component until patching can be completed.
Consult BeyondTrust documentation for specific Avecto component disablement procedures
🧯 If You Can't Patch
- Implement strict least privilege principles and limit local administrator access
- Enhance monitoring for unusual process spawning and privilege escalation attempts
🔍 How to Verify
Check if Vulnerable:
Check the installed version of BeyondTrust Privilege Management for Windows via Control Panel > Programs and Features or using PowerShell: Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*BeyondTrust*Privilege*'}
Check Version:
Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*BeyondTrust*Privilege*'} | Select-Object Name, Version
Verify Fix Applied:
Verify version is 5.6 SR1 or later using the same version check command and confirm no privilege escalation occurs during testing.
📡 Detection & Monitoring
Log Indicators:
- Multiple user tokens in single process creation events
- Unusual privilege elevation patterns in Windows security logs
- Avecto component errors or warnings
Network Indicators:
- Lateral movement attempts following local privilege escalation
SIEM Query:
EventID=4688 AND ProcessName LIKE '%powershell%' OR ProcessName LIKE '%cmd%' AND SubjectUserName != TargetUserName
🔗 References
- https://www.beyondtrust.com/support/changelog/privilege-management-for-windows-5-6-sr1
- https://www.beyondtrust.com/trust-center/security-advisories/bt22-11
- https://www.beyondtrust.com/support/changelog/privilege-management-for-windows-5-6-sr1
- https://www.beyondtrust.com/trust-center/security-advisories/bt22-11