CVE-2020-13539

7.8 HIGH

📋 TL;DR

This vulnerability allows local attackers to escalate privileges on systems running Win-911 Enterprise V4.20.13 by exploiting weak file system permissions in the installation directory. Attackers can overwrite executables that run with higher privileges, potentially gaining full system control. Only users with local access to affected Win-911 Enterprise installations are impacted.

💻 Affected Systems

Products:
  • Win-911 Enterprise
Versions: Version 4.20.13
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations where the WIN-911 Mobile Runtime service is running with vulnerable permissions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where an attacker gains SYSTEM/administrator privileges, enabling installation of persistent malware, data theft, and full control over the industrial control system.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, install additional tools, and move laterally within the network.

🟢

If Mitigated

Limited impact with proper access controls, file integrity monitoring, and least privilege principles in place.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local system access.
🏢 Internal Only: HIGH - Attackers with initial access to affected systems can escalate privileges and compromise critical industrial control infrastructure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the system and knowledge of the vulnerable directory structure. The vulnerability is straightforward to exploit once initial access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 4.20.14 or later

Vendor Advisory: https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1150

Restart Required: Yes

Instructions:

1. Download Win-911 Enterprise version 4.20.14 or later from the vendor. 2. Stop the WIN-911 Mobile Runtime service. 3. Install the updated version. 4. Restart the service and verify proper operation.

🔧 Temporary Workarounds

Restrict File System Permissions

windows

Manually adjust permissions on the Win-911 installation directory to prevent unauthorized write access.

icacls "C:\Program Files\Win-911 Enterprise" /inheritance:r /grant:r "SYSTEM:(OI)(CI)F" /grant:r "Administrators:(OI)(CI)F" /grant:r "Users:(OI)(CI)RX"

Disable Vulnerable Service

windows

Stop and disable the WIN-911 Mobile Runtime service if not required for operations.

sc stop "WIN-911 Mobile Runtime"
sc config "WIN-911 Mobile Runtime" start= disabled

🧯 If You Can't Patch

  • Implement strict access controls to limit who can log into systems running Win-911 Enterprise.
  • Deploy file integrity monitoring on the Win-911 installation directory to detect unauthorized modifications.

🔍 How to Verify

Check if Vulnerable:

Check if Win-911 Enterprise version 4.20.13 is installed and verify file permissions on the installation directory allow write access to non-administrative users.

Check Version:

Check the version in Control Panel > Programs and Features or examine the Win-911 application properties.

Verify Fix Applied:

Confirm installation of version 4.20.14 or later and verify that only SYSTEM and Administrators have write permissions to the Win-911 directory.

📡 Detection & Monitoring

Log Indicators:

  • Windows Security Event ID 4663 (File system access) showing unauthorized write attempts to Win-911 directories
  • Application logs showing unexpected service restarts or failures

Network Indicators:

  • Unusual outbound connections from Win-911 systems following local access events

SIEM Query:

EventID=4663 AND ObjectName LIKE '%Win-911%' AND AccessMask=0x2

🔗 References

📤 Share & Export