CVE-2020-12614

7.8 HIGH

📋 TL;DR

This vulnerability in BeyondTrust Privilege Management for Windows allows attackers to bypass certificate validation when publisher criteria is selected for Add Admin tokens. A standard user can exploit this to elevate privileges to administrator level. Organizations using affected versions of BeyondTrust Privilege Management for Windows are at risk.

💻 Affected Systems

Products:
  • BeyondTrust Privilege Management for Windows
Versions: Through version 5.6
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists when publisher criteria is selected for Add Admin tokens. Systems using this specific configuration are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where any standard user can gain administrator privileges, potentially leading to full domain takeover, data exfiltration, or ransomware deployment.

🟠

Likely Case

Privilege escalation within Windows environments allowing attackers to bypass security controls, install malware, or access restricted resources.

🟢

If Mitigated

Limited impact with proper certificate validation and least privilege principles in place, though the vulnerability still presents a security gap.

🌐 Internet-Facing: LOW - This is primarily an internal privilege escalation vulnerability requiring local access or initial foothold.
🏢 Internal Only: HIGH - Any standard user on affected systems can potentially gain administrator privileges, making this a significant internal threat.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires standard user access and knowledge of the vulnerable configuration. The vulnerability is well-documented in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.6 SR1 and later versions

Vendor Advisory: https://www.beyondtrust.com/trust-center/security-advisories/bt22-10

Restart Required: Yes

Instructions:

1. Download BeyondTrust Privilege Management for Windows 5.6 SR1 or later from BeyondTrust support portal. 2. Backup current configuration. 3. Install the update following vendor instructions. 4. Restart affected systems. 5. Verify the update was successful.

🔧 Temporary Workarounds

Disable Publisher Criteria for Add Admin Tokens

windows

Temporarily remove publisher criteria requirement for Add Admin tokens until patching can be completed.

Use BeyondTrust Privilege Management console to modify token policies and remove publisher criteria from Add Admin tokens

Implement Additional Certificate Validation

windows

Add supplemental certificate validation checks through group policy or other security controls.

🧯 If You Can't Patch

  • Implement strict least privilege principles and monitor for privilege escalation attempts
  • Deploy additional endpoint detection and response (EDR) solutions to detect abnormal privilege elevation

🔍 How to Verify

Check if Vulnerable:

Check BeyondTrust Privilege Management version and verify if publisher criteria is configured for Add Admin tokens. Review security advisory BT22-10 for specific indicators.

Check Version:

Check BeyondTrust Privilege Management console or use PowerShell: Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*BeyondTrust*'} | Select-Object Name, Version

Verify Fix Applied:

Verify installation of version 5.6 SR1 or later through BeyondTrust console and confirm publisher criteria validation is functioning correctly.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege elevation events in Windows Security logs
  • BeyondTrust audit logs showing Add Admin token usage with publisher criteria
  • Event ID 4688 with privilege changes

Network Indicators:

  • Unusual authentication patterns from standard user accounts
  • Lateral movement attempts following privilege escalation

SIEM Query:

source="windows_security" event_id=4688 AND (privileges="SeDebugPrivilege" OR privileges="SeTcbPrivilege") AND user="standard_user_account"

🔗 References

📤 Share & Export