Rapid7 Vulnerability & Exploit Database

Microsoft Windows: CVE-2020-16980: Windows iSCSI Target Service Elevation of Privilege Vulnerability

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Microsoft Windows: CVE-2020-16980: Windows iSCSI Target Service Elevation of Privilege Vulnerability

Severity
5
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Published
10/13/2020
Created
10/14/2020
Added
10/13/2020
Modified
09/11/2024

Description

An elevation of privilege vulnerability exists when the Windows iSCSI Target Service improperly handles file operations, aka 'Windows iSCSI Target Service Elevation of Privilege Vulnerability'.

Solution(s)

  • microsoft-windows-windows_server_2012-kb4580353
  • microsoft-windows-windows_server_2012_r2-kb4580358
  • microsoft-windows-windows_server_2016-1607-kb4580346
  • microsoft-windows-windows_server_2019-1809-kb4577668
  • msft-kb4577671-c42dc613-fb5b-4c45-925c-4f508584a635
  • msft-kb4577671-ddbf4c81-6ca7-4986-999e-9275ef508017
  • msft-kb4579311-e9f0550d-b150-4eeb-bf5e-1a08b117e7af
  • msft-kb4580353-3e254f1d-7bf3-4f94-8817-a6eb0accedc0
  • msft-kb4580353-59e7e42c-6434-4e0a-bd9f-b504d629f516
  • msft-kb4580358-12cf7c4b-339c-47dc-a087-73a7a0dedf6f
  • msft-kb4580358-ef30fd6b-8580-4ec5-9190-5cdb4b02f438

insightVM

Advanced vulnerability management analytics and reporting.
Key Features
  • Lightweight Endpoint Agent
  • Live Dashboards
  • Real Risk Prioritization
  • IT-Integrated Remediation Projects
  • Cloud, Virtual, and Container Assessment
  • Integrated Threat Feeds
  • Easy-to-Use RESTful API
  • Automation-Assisted Patching
  • Automated Containment
Free InsightVM Trial View All Features

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;