CVE-2020-9668

7.8 HIGH

📋 TL;DR

This vulnerability in Adobe Genuine Service allows attackers to exploit improper access control when handling symbolic links, enabling privilege escalation. Unauthenticated attackers can gain elevated privileges within the current user's context. Users running Adobe Genuine Service version 6.6 or earlier are affected.

💻 Affected Systems

Products:
  • Adobe Genuine Service
Versions: 6.6 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both Windows and macOS versions of Adobe Genuine Service. The service runs with elevated privileges by design.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through privilege escalation to SYSTEM/root level, allowing installation of malware, data theft, or persistence mechanisms.

🟠

Likely Case

Local privilege escalation allowing attackers to execute arbitrary code with higher privileges than their current user account.

🟢

If Mitigated

Limited impact with proper access controls and patching, restricting attackers to their original privilege level.

🌐 Internet-Facing: LOW - This is primarily a local privilege escalation vulnerability requiring local access to the system.
🏢 Internal Only: MEDIUM - Internal attackers with local access could exploit this to escalate privileges on compromised workstations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The advisory states unauthenticated attackers can exploit this, suggesting relatively straightforward exploitation once the vulnerability is understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.7 or later

Vendor Advisory: https://helpx.adobe.com/security/products/integrity_service/apsb20-42.html

Restart Required: Yes

Instructions:

1. Open Adobe Genuine Service application. 2. Check for updates in settings. 3. If no update option, download latest version from Adobe website. 4. Install update. 5. Restart system.

🔧 Temporary Workarounds

Disable Adobe Genuine Service

windows

Temporarily disable the service if patching is not immediately possible

sc stop AGSService
sc config AGSService start= disabled

Remove symbolic link creation privileges

all

Restrict ability to create symbolic links to prevent exploitation

🧯 If You Can't Patch

  • Implement strict access controls to limit who can create symbolic links on affected systems
  • Monitor for unusual privilege escalation attempts and file system activities related to Adobe Genuine Service

🔍 How to Verify

Check if Vulnerable:

Check Adobe Genuine Service version in application settings or via 'AGSService --version' command

Check Version:

AGSService --version

Verify Fix Applied:

Verify version is 6.7 or later and test symbolic link handling with controlled test cases

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns involving Adobe Genuine Service directories
  • Privilege escalation attempts in security logs

Network Indicators:

  • None - this is a local privilege escalation vulnerability

SIEM Query:

EventID=4688 AND ProcessName LIKE '%AGSService%' AND NewProcessName NOT LIKE '%AGSService%'

🔗 References

📤 Share & Export