CVE-2020-16905
📋 TL;DR
This CVE describes a privilege escalation vulnerability in Windows Error Reporting (WER) where improper file handling could allow attackers to gain elevated system privileges. Attackers could exploit this by running specially crafted applications to access sensitive information and system functionality. This affects Windows systems with WER enabled.
💻 Affected Systems
- Microsoft Windows
📦 What is this software?
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with administrative privileges, allowing complete control over the system, data theft, and lateral movement.
Likely Case
Local privilege escalation from standard user to SYSTEM/administrator level, enabling installation of malware, persistence mechanisms, and access to protected resources.
If Mitigated
Limited impact with proper patch management and least privilege principles in place, though still a significant local attack vector.
🎯 Exploit Status
Exploitation requires local access and ability to execute specially crafted applications. No public proof-of-concept has been disclosed as of knowledge cutoff.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: October 2020 security updates (Patch Tuesday)
Vendor Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16905
Restart Required: Yes
Instructions:
1. Apply October 2020 Windows security updates via Windows Update. 2. For enterprise environments, deploy patches through WSUS or SCCM. 3. Verify installation via Windows Update history or system information.
🔧 Temporary Workarounds
Disable Windows Error Reporting
windowsTemporarily disable WER service to prevent exploitation while patching
sc config WerSvc start= disabled
sc stop WerSvc
Configure WER via Group Policy
windowsRestrict WER functionality through Group Policy settings
🧯 If You Can't Patch
- Implement strict application control policies to prevent execution of unauthorized applications
- Enforce least privilege principles and segment networks to limit lateral movement
🔍 How to Verify
Check if Vulnerable:
Check Windows build number via winver command and compare against patched versions (post-October 2020 updates)
Check Version:
winver or systeminfo | findstr /B /C:"OS Name" /C:"OS Version"
Verify Fix Applied:
Verify October 2020 security updates are installed via Windows Update history or Get-Hotfix -Id KB4578974 (example KB)
📡 Detection & Monitoring
Log Indicators:
- Unusual WER service activity
- Suspicious process creation from WER context
- Failed privilege escalation attempts in security logs
Network Indicators:
- Unusual outbound connections from WER-related processes
SIEM Query:
EventID=4688 AND (NewProcessName contains "wer" OR ParentProcessName contains "wer") AND SubjectUserName != SYSTEM