CVE-2020-13541

8.8 HIGH

📋 TL;DR

This vulnerability allows local attackers to escalate privileges on systems running Mobile-911 Server V2.5 by exploiting weak file system permissions in the installation directory. Attackers can overwrite service executables or other files to execute arbitrary code with SYSTEM privileges. Only users running the vulnerable Mobile-911 Server version are affected.

💻 Affected Systems

Products:
  • Mobile-911 Server
Versions: V2.5
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation configuration with weak file permissions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, allowing attackers to install persistent malware, steal credentials, or pivot to other systems.

🟠

Likely Case

Local privilege escalation leading to unauthorized administrative access, data theft, or lateral movement within the network.

🟢

If Mitigated

Limited impact with proper file permissions and access controls preventing unauthorized file modifications.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the system but is straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V2.6 or later

Vendor Advisory: https://talosintelligence.com/vulnerability_reports/TALOS-2020-1151

Restart Required: Yes

Instructions:

1. Download and install Mobile-911 Server V2.6 or later from the official vendor. 2. Uninstall the vulnerable V2.5 version. 3. Restart the system to ensure clean service startup.

🔧 Temporary Workarounds

Restrict File Permissions

windows

Manually set proper file system permissions on the Mobile-911 Server installation directory to prevent unauthorized modifications.

icacls "C:\Program Files\Mobile-911 Server" /inheritance:r /grant:r "SYSTEM:(OI)(CI)F" "Administrators:(OI)(CI)F" "Users:(OI)(CI)RX"

Remove Unnecessary User Access

windows

Ensure only authorized administrators have write access to the installation directory.

icacls "C:\Program Files\Mobile-911 Server" /remove:g "Users" /T

🧯 If You Can't Patch

  • Implement strict access controls and monitor for unauthorized file modifications in the installation directory.
  • Isolate the vulnerable system from critical network segments and implement application whitelisting.

🔍 How to Verify

Check if Vulnerable:

Check if Mobile-911 Server V2.5 is installed and verify file permissions on the installation directory allow write access to non-administrative users.

Check Version:

Check the version in the application's About dialog or examine the executable properties.

Verify Fix Applied:

Confirm installation of V2.6 or later and verify that file permissions restrict write access to SYSTEM and Administrators only.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Log entries showing file modifications in the Mobile-911 Server directory by non-administrative users
  • Unexpected service restarts or process creations from the Mobile-911 Server directory

Network Indicators:

  • Unusual outbound connections from the Mobile-911 Server system following local privilege escalation

SIEM Query:

EventID=4663 AND ObjectName LIKE '%Mobile-911 Server%' AND SubjectUserName NOT IN ('SYSTEM', 'Administrator')

🔗 References

📤 Share & Export