CVE-2020-18170

9.8 CRITICAL

📋 TL;DR

This vulnerability in Abloy Key Manager's SeChangeNotifyPrivilege component allows attackers to escalate privileges by manipulating permissions. It affects Abloy Key Manager version 7.14301.0.0, potentially enabling unauthorized access to sensitive key management functions.

💻 Affected Systems

Products:
  • Abloy Key Manager
Versions: Version 7.14301.0.0
Operating Systems: Windows (based on SeChangeNotifyPrivilege component)
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability specifically affects the SeChangeNotifyPrivilege component, which is a Windows security privilege.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with administrative privileges, allowing attackers to manage or steal cryptographic keys, disable security systems, or maintain persistent access.

🟠

Likely Case

Privilege escalation to gain unauthorized access to key management functions, potentially compromising physical access control systems.

🟢

If Mitigated

Limited impact if proper access controls and network segmentation are in place, restricting attacker movement.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires initial access to the system and knowledge of privilege escalation techniques targeting SeChangeNotifyPrivilege.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

Check with Abloy for security updates or patches. Upgrade to a newer version if available.

🔧 Temporary Workarounds

Restrict SeChangeNotifyPrivilege

windows

Limit which users/groups have SeChangeNotifyPrivilege to reduce attack surface.

Use Local Security Policy or Group Policy to modify 'Bypass traverse checking' privilege assignments

Network Segmentation

all

Isolate Abloy Key Manager systems from general network access.

🧯 If You Can't Patch

  • Implement strict access controls and least privilege principles for all user accounts.
  • Monitor system logs for unusual privilege escalation attempts or permission changes.

🔍 How to Verify

Check if Vulnerable:

Check Abloy Key Manager version. If running version 7.14301.0.0, assume vulnerable.

Check Version:

Check within Abloy Key Manager application interface or installation directory for version information.

Verify Fix Applied:

Verify version has been updated beyond 7.14301.0.0 or check with vendor for patch confirmation.

📡 Detection & Monitoring

Log Indicators:

  • Windows Security Event Logs showing privilege escalation attempts
  • Unexpected changes to user permissions or privileges

Network Indicators:

  • Unusual network traffic to/from key manager systems
  • Authentication attempts from unexpected sources

SIEM Query:

EventID=4672 OR EventID=4673 (Windows privilege assignment/use) combined with process names containing 'abloy' or 'key manager'

🔗 References

📤 Share & Export