Rapid7 Vulnerability & Exploit Database

Microsoft Windows: CVE-2020-1356: Windows iSCSI Target Service Elevation of Privilege Vulnerability

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Microsoft Windows: CVE-2020-1356: Windows iSCSI Target Service Elevation of Privilege Vulnerability

Severity
5
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Published
07/14/2020
Created
07/15/2020
Added
07/14/2020
Modified
09/11/2024

Description

An elevation of privilege vulnerability exists when the Windows iSCSI Target Service improperly handles file operations, aka 'Windows iSCSI Target Service Elevation of Privilege Vulnerability'.

Solution(s)

  • microsoft-windows-windows_server_2012_r2-kb4565540
  • microsoft-windows-windows_server_2016-1607-kb4565511
  • microsoft-windows-windows_server_2019-1809-kb4558998
  • msft-kb4565483-3953c76a-16d0-4028-977a-0a5108a8c373
  • msft-kb4565483-b3f51921-6afd-4c38-8092-51c1be956806
  • msft-kb4565503-9f4ad806-f4a9-4868-b9a2-900b0a123d96
  • msft-kb4565535-111aa627-8dcf-4b02-80bf-d9c15c7c6d15
  • msft-kb4565535-d9dde094-c8da-4c41-93bf-de9b0b58c9a1
  • msft-kb4565535-f965746a-43c8-4b7d-a0f1-d663818deda3
  • msft-kb4565540-16d7b82b-31ae-4b66-82b4-10ecf2a2980d
  • msft-kb4565540-84942b6a-22e3-45d8-952e-3476d7483b60

insightVM

Advanced vulnerability management analytics and reporting.
Key Features
  • Lightweight Endpoint Agent
  • Live Dashboards
  • Real Risk Prioritization
  • IT-Integrated Remediation Projects
  • Cloud, Virtual, and Container Assessment
  • Integrated Threat Feeds
  • Easy-to-Use RESTful API
  • Automation-Assisted Patching
  • Automated Containment
Free InsightVM Trial View All Features

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;