{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T16:11:35.490","vulnerabilities":[{"cve":{"id":"CVE-2020-3427","sourceIdentifier":"psirt@cisco.com","published":"2020-10-14T19:15:13.977","lastModified":"2024-11-21T05:31:02.883","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Windows Logon installer prior to 4.1.2 did not properly validate file installation paths. This allows an attacker with local user privileges to coerce the installer to write to arbitrary privileged directories. If successful, an attacker can manipulate files used by Windows Logon, cause Denial of Service (DoS) by deleting file(s), or replace system files to potentially achieve elevation of privileges. Note that this can only exploitable during new installations while the installer is running and is not exploitable once installation is finished. Versions 4.1.2 of Windows Logon addresses this issue."},{"lang":"es","value":"El instalador de Windows Logon en versiones anteriores a 4.1.2 no validó correctamente las rutas de instalación de los archivos. Esto permite que un atacante con privilegios de usuario local pueda coaccionar al instalador para que escriba en directorios privilegiados arbitrarios. Si tiene éxito, un atacante puede manipular los archivos utilizados por Windows Logon, causar una denegación de servicio (DoS) mediante la eliminación de archivos o sustituir los archivos del sistema para lograr potencialmente la elevación de los privilegios. Tenga en cuenta que esto sólo se puede explotar durante las nuevas instalaciones mientras el instalador se está ejecutando y no se puede explotar una vez finalizada la instalación. La versión 4.1.2 de Windows Logon soluciona este problema"}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N","baseScore":6.6,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":1.3,"impactScore":5.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-280"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:duo_authentication_for_windows_logon_and_rdp:*:*:*:*:*:*:*:*","versionEndExcluding":"4.1.2","matchCriteriaId":"D7021EA7-88DF-4394-86DA-A25513FF5D1E"}]}]}],"references":[{"url":"https://duo.com/docs/rdp-notes","source":"psirt@cisco.com","tags":["Release Notes","Vendor Advisory"]},{"url":"https://duo.com/docs/rdp-notes","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes","Vendor Advisory"]}]}}]}