CVE-2020-12615
📋 TL;DR
This vulnerability in BeyondTrust Privilege Management for Windows allows attackers to steal security tokens when the 'Add Admin' token is configured to run at medium integrity with user ownership. Attackers can apply these stolen tokens to arbitrary processes, potentially escalating privileges. Organizations using affected versions of BeyondTrust Privilege Management for Windows are at risk.
💻 Affected Systems
- BeyondTrust Privilege Management for Windows
📦 What is this software?
Privilege Management For Windows by Beyondtrust
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise through privilege escalation to SYSTEM/admin level, enabling complete control over the Windows environment.
Likely Case
Local privilege escalation allowing attackers to gain administrative privileges on compromised systems.
If Mitigated
Limited impact with proper access controls and monitoring, but still presents security risk.
🎯 Exploit Status
Requires local access and knowledge of the specific token configuration to exploit.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.6 SR1 and later
Vendor Advisory: https://www.beyondtrust.com/trust-center/security-advisories/bt22-07
Restart Required: Yes
Instructions:
1. Download BeyondTrust Privilege Management for Windows 5.6 SR1 or later from BeyondTrust support portal. 2. Backup current configuration. 3. Install the update following vendor instructions. 4. Restart affected systems. 5. Verify installation and functionality.
🔧 Temporary Workarounds
Disable Add Admin Token Feature
windowsTemporarily disable the 'Add Admin' token functionality until patching can be completed.
Use BeyondTrust management console to modify policies and remove Add Admin token configurations
Restrict Token Usage
windowsConfigure tokens to run with higher integrity levels or different ownership settings that are not vulnerable.
Modify token policies in BeyondTrust console to avoid medium integrity with user ownership combinations
🧯 If You Can't Patch
- Implement strict access controls and monitoring on systems using BeyondTrust Privilege Management
- Isolate affected systems from critical network segments and implement application whitelisting
🔍 How to Verify
Check if Vulnerable:
Check BeyondTrust Privilege Management version in Control Panel > Programs and Features, or run 'pmw.exe --version' from command line.
Check Version:
pmw.exe --version
Verify Fix Applied:
Verify installed version is 5.6 SR1 or later, and test token functionality to ensure proper behavior.
📡 Detection & Monitoring
Log Indicators:
- Unusual token creation or modification events in BeyondTrust logs
- Multiple failed privilege escalation attempts followed by successful ones
Network Indicators:
- Not applicable - local privilege escalation
SIEM Query:
source="BeyondTrust" AND (event_type="token_creation" OR event_type="privilege_escalation")
🔗 References
- https://www.beyondtrust.com/support/changelog/privilege-management-for-windows-5-6-sr1
- https://www.beyondtrust.com/trust-center/security-advisories/bt22-07
- https://www.beyondtrust.com/support/changelog/privilege-management-for-windows-5-6-sr1
- https://www.beyondtrust.com/trust-center/security-advisories/bt22-07