CVE-2020-0787

An elevation of privilege vulnerability exists when the Windows Background Intelligent Transfer Service (BITS) improperly handles symbolic links,...

Basic Information

CVE State
PUBLISHED
Reserved Date
November 04, 2019
Published Date
March 12, 2020
Last Updated
February 07, 2025
Vendor
Microsoft
Product
Windows, Windows Server, Windows 10 Version 1909 for 32-bit Systems, Windows 10 Version 1909 for x64-based Systems, Windows 10 Version 1909 for ARM64-based Systems, Windows Server, version 1909 (Server Core installation), Windows 10 Version 1903 for 32-bit Systems, Windows 10 Version 1903 for x64-based Systems, Windows 10 Version 1903 for ARM64-based Systems, Windows Server, version 1903 (Server Core installation)
Description
An elevation of privilege vulnerability exists when the Windows Background Intelligent Transfer Service (BITS) improperly handles symbolic links, aka 'Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability'.

CVSS Scores

SSVC Information

Exploitation
active
Technical Impact
total

Exploit Status

Exploited in the Wild
Yes (added 2022-01-28 00:00:00 UTC) Source
Proof of Concept Available
Yes (added 2021-11-16 11:04:42 UTC) Source
Used in Malware
Yes (added 2022-01-28 00:00:00 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
CISA 2022-01-28 00:00:00 UTC

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

cve_2020_0787_bits_arbitrary_file_move

Type: metasploit • Created: Unknown

Metasploit module for CVE-2020-0787

yanghaoi/CVE-2020-0787

Type: github • Created: 2021-11-16 11:04:42 UTC • Stars: 31

CVE-2020-0787的简单回显

cbwang505/CVE-2020-0787-EXP-ALL-WINDOWS-VERSION

Type: github • Created: 2020-06-16 08:57:51 UTC • Stars: 715

Support ALL Windows Version