{"id":305,"date":"2020-09-11T12:57:19","date_gmt":"2020-09-11T12:57:19","guid":{"rendered":"http:\/\/labs.redyops.com\/?p=305"},"modified":"2021-10-06T06:40:27","modified_gmt":"2021-10-06T06:40:27","slug":"ibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486","status":"publish","type":"post","link":"https:\/\/labs.redyops.com\/index.php\/2020\/09\/11\/ibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486\/","title":{"rendered":"IBM QRadar Wincollect Escalation of Privilege  (CVE-2020-4485 &#038; CVE-2020-4486)"},"content":{"rendered":"<div class=\"addtoany_shortcode\"><div class=\"a2a_kit a2a_kit_size_32 addtoany_list\" data-a2a-url=\"https:\/\/labs.redyops.com\/index.php\/2020\/09\/11\/ibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486\/\" data-a2a-title=\"IBM QRadar Wincollect Escalation of Privilege  (CVE-2020-4485 &amp; CVE-2020-4486)\"><a class=\"a2a_button_copy_link\" href=\"https:\/\/www.addtoany.com\/add_to\/copy_link?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F09%2F11%2Fibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486%2F&amp;linkname=IBM%20QRadar%20Wincollect%20Escalation%20of%20Privilege%20%20%28CVE-2020-4485%20%26%20CVE-2020-4486%29\" title=\"Copy Link\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_twitter\" href=\"https:\/\/www.addtoany.com\/add_to\/twitter?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F09%2F11%2Fibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486%2F&amp;linkname=IBM%20QRadar%20Wincollect%20Escalation%20of%20Privilege%20%20%28CVE-2020-4485%20%26%20CVE-2020-4486%29\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_facebook\" href=\"https:\/\/www.addtoany.com\/add_to\/facebook?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F09%2F11%2Fibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486%2F&amp;linkname=IBM%20QRadar%20Wincollect%20Escalation%20of%20Privilege%20%20%28CVE-2020-4485%20%26%20CVE-2020-4486%29\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_linkedin\" href=\"https:\/\/www.addtoany.com\/add_to\/linkedin?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F09%2F11%2Fibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486%2F&amp;linkname=IBM%20QRadar%20Wincollect%20Escalation%20of%20Privilege%20%20%28CVE-2020-4485%20%26%20CVE-2020-4486%29\" title=\"LinkedIn\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_whatsapp\" href=\"https:\/\/www.addtoany.com\/add_to\/whatsapp?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F09%2F11%2Fibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486%2F&amp;linkname=IBM%20QRadar%20Wincollect%20Escalation%20of%20Privilege%20%20%28CVE-2020-4485%20%26%20CVE-2020-4486%29\" title=\"WhatsApp\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_viber\" href=\"https:\/\/www.addtoany.com\/add_to\/viber?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F09%2F11%2Fibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486%2F&amp;linkname=IBM%20QRadar%20Wincollect%20Escalation%20of%20Privilege%20%20%28CVE-2020-4485%20%26%20CVE-2020-4486%29\" title=\"Viber\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_facebook_messenger\" href=\"https:\/\/www.addtoany.com\/add_to\/facebook_messenger?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F09%2F11%2Fibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486%2F&amp;linkname=IBM%20QRadar%20Wincollect%20Escalation%20of%20Privilege%20%20%28CVE-2020-4485%20%26%20CVE-2020-4486%29\" title=\"Messenger\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_telegram\" href=\"https:\/\/www.addtoany.com\/add_to\/telegram?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F09%2F11%2Fibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486%2F&amp;linkname=IBM%20QRadar%20Wincollect%20Escalation%20of%20Privilege%20%20%28CVE-2020-4485%20%26%20CVE-2020-4486%29\" title=\"Telegram\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_skype\" href=\"https:\/\/www.addtoany.com\/add_to\/skype?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F09%2F11%2Fibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486%2F&amp;linkname=IBM%20QRadar%20Wincollect%20Escalation%20of%20Privilege%20%20%28CVE-2020-4485%20%26%20CVE-2020-4486%29\" title=\"Skype\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_sms\" href=\"https:\/\/www.addtoany.com\/add_to\/sms?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F09%2F11%2Fibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486%2F&amp;linkname=IBM%20QRadar%20Wincollect%20Escalation%20of%20Privilege%20%20%28CVE-2020-4485%20%26%20CVE-2020-4486%29\" title=\"Message\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_dd addtoany_share_save addtoany_share\" href=\"https:\/\/www.addtoany.com\/share\"><\/a><\/div><\/div>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Summary<\/strong><\/h1>\n\n\n\n<p><strong>Assigned CVE<\/strong>: <em>CVE-2020-4485 and CVE-2020-4486<\/em> have been assigned and RedyOps Labs has been publicly acknowledged by the vendor.<\/p>\n\n\n\n<p><strong>Known to Neurosoft&#8217;s RedyOps Labs since<\/strong>: 13\/05\/2020<\/p>\n\n\n\n<p><strong>Exploit<\/strong> <strong>Code<\/strong>: N\/A<\/p>\n\n\n\n<p><strong>Vendor&#8217;s Advisory<\/strong>: <a href=\"https:\/\/www.ibm.com\/support\/pages\/node\/6257885\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.ibm.com\/support\/pages\/node\/6257885<\/a><\/p>\n\n\n\n<p>An Elevation of Privilege (EoP) exists in IBM QRadar Wincollect 7.2.0 &#8211; 7.2.9 . The vulnerability described gives the ability to a low privileged user to delete any file from the System and disable the Wincollect service. This arbitrary delete vulnerability can be leveraged in order to gain access as NT AUTHORITY\\SYSTEM.  During the exploitation, the attacker disables the Wincollect service. <\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Description<\/strong><\/h1>\n\n\n\n<p>There are two distinct root causes which can lead to the same issue (arbitrary delete):<br>After the installation of the WinCollect, the installer remains under the folder c:\\Windows\\Installer . Any user with low privileges can run the installer with the following command:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>msiexec \/fa c:\\Windows\\Installer****.msi<\/code><\/pre>\n\n\n\n<p>The WinCollect\u2019s installer, although it will eventually fail when executed by a low privileged user, it will create log files under the User\u2019s Temp folder. <\/p>\n\n\n\n<p>At some point, the installer will try to delete those log files as SYSTEM. As long as the user controls the files in his Temp folder (C:\\Users\\username\\AppData\\Local\\Temp), they can create a symlink targeting any file in the system. When the installer tries to delete these files, it will follow the symlink and will perform the delete actions as SYSTEM.<\/p>\n\n\n\n<p>Even if the symlinks are mitigated in the future by Microsoft, an attacker can achieve the arbitrary delete by editing the file <strong>~xxxx.tmp<\/strong> . <\/p>\n\n\n\n<p>The file <strong>C:\\Users\\username\\AppData\\Local\\Temp\\~xxxx.tmp<\/strong> where xxxx is a random hex, ends with the lines:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>&#091;SearchRepalceTargetBackupFiles]\nC:\\Program Files\\IBM\\WinCollect\\config\\CmdLine.txt=C:\\Users\\attacker\\AppData\\Local\\Temp_isFD30\nC:\\Program Files\\IBM\\WinCollect\\config\\logconfig_template.xml=C:\\Users\\attacker\\AppData\\Local\\Temp_isFD8F\nC:\\Program Files\\IBM\\WinCollect\\templates\\tmplt_AgentCore.xml=C:\\Users\\attacker\\AppData\\Local\\Temp_isFDAF<\/code><\/pre>\n\n\n\n<p>An attacker can edit these lines and add the files he wants to delete. For example:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>&#091;SearchRepalceTargetBackupFiles]\nC:\\Program Files\\IBM\\WinCollect\\config\\CmdLine.txt=C:\\windows\\win.ini\nC:\\Program Files\\IBM\\WinCollect\\config\\logconfig_template.xml=C:\\Users\\Admin\\whatever.exe\nC:\\Program Files\\IBM\\WinCollect\\templates\\tmplt_AgentCore.xml=C:\\Users\\anotheruser\\logs.txt<\/code><\/pre>\n\n\n\n<p>When we cancel the installer, these files will be deleted as SYSTEM.<\/p>\n\n\n\n<p>As a bonus, during this process, the wincollect service will stop and will remain stopped, until we cancel the operation.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1281\" height=\"918\" src=\"http:\/\/labs.redyops.com\/wp-content\/uploads\/2020\/09\/IBM.png\" alt=\"\" class=\"wp-image-311\"\/><\/figure>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Exploitation<\/strong><\/h1>\n\n\n\n<p>In order to Exploit the issue, no special program is needed . <\/p>\n\n\n\n<p>In the following paragraph, a step by step explanation of the Video PoC is provided.<\/p>\n\n\n\n<p>Please note, that the vulnerability of the IBM QRadar Wincollect ends when we delete the WER folder (or any other file\/folder you want to delete). <\/p>\n\n\n\n<p>The use of the arbitrary delete issues, in order to escalate to SYSTEM, is irrelevant to this vulnerability and it is an MS Windows issue. This technique has been described by <a href=\"https:\/\/twitter.com\/jonasLyk\" target=\"_blank\" rel=\"noreferrer noopener\">Jonas L<\/a> in his blogpost <a href=\"https:\/\/secret.club\/2020\/04\/23\/directory-deletion-shell.html\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/secret.club\/2020\/04\/23\/directory-deletion-shell.html <\/a><\/p>\n\n\n\n<p>The delete.exe is an implementation of this technique, which can be found in my github repo <a href=\"https:\/\/github.com\/DimopoulosElias\/Primitives\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/DimopoulosElias\/Primitives<\/a> <\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Video PoC Step By Step<\/strong><\/h1>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"User to System CVE-2020-4485 and CVE-2020-4486\" width=\"525\" height=\"295\" src=\"https:\/\/www.youtube.com\/embed\/Ww13Ya54yiA?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>00:00-00:11: We present the environment. We are low privileged users and the installer file we are going to use is the 11ec43.msi . This file, belongs to IBM and is the installer file of the wincollect agent.<\/p>\n\n\n\n<p>00:11-00:22: As low privileged users, we run the installer. At the end of this time frame (00:22) the wincollect service has stopped . We can stay at this position as long as we want to and perform any actions we want to, with the wincollect service being disabled (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-4485\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-4485<\/a>).<\/p>\n\n\n\n<p>00:22-00:58: We are going to use the technique presented by <a href=\"https:\/\/secret.club\/2020\/04\/23\/directory-deletion-shell.html\" target=\"_blank\" rel=\"noreferrer noopener\">Jonas L<\/a> , in order to leverage the arbitrary delete and gain access as SYSTEM. For this to be achieved, we need to delete the folder <strong>C:\\ProgramData\\Microsoft\\Windows\\WER<\/strong> , which can not be deleted by a low privileged user. However, some sub-folders can be deleted. At this time frame, we delete the sub-folders we are able to, without any exploitation.<\/p>\n\n\n\n<p>00:58-02:42: By exploiting the <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-4486\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-4486<\/a> , we delete the remaining files and sub-folders from the WER folder. A low privileged user, would not be able to delete those files\/folders, as we presented in the previous time frame. The <a href=\"https:\/\/docs.microsoft.com\/en-us\/openspecs\/windows_protocols\/ms-fscc\/c54dec26-1551-4d3a-a0ea-4fa40f848eb3\" target=\"_blank\" rel=\"noreferrer noopener\">$INDEX_ALLOCATION<\/a> is  used in order to delete a folder instead of a file . <\/p>\n\n\n\n<p>02:42-03:58: We run the exploitation procedure one more time, in order to delete the  <strong>C:\\ProgramData\\Microsoft\\Windows\\WER<\/strong> folder. At this point, the use of <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-4486\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-4486<\/a> ends. The rest of the video presents the use of this primitive in order to escalate to SYSTEM and is irrelevant to the IBM WinCollect issues.<\/p>\n\n\n\n<p>03:58-end: Now that we have deleted the WER folder, we use the <a href=\"https:\/\/github.com\/DimopoulosElias\/Primitives\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/DimopoulosElias\/Primitives<\/a> is order to become a SYSTEM. Again, this has nothing to do with the IBM vulnerabilities. It&#8217;s a primitive which allows us to use any (or almost any) arbitrary delete, in order to escalate to SYSTEM. <\/p>\n\n\n\n<p>We will leave the escalation with the use of symlinks as an exercise for you \ud83d\ude42 .<\/p>\n\n\n<div class=\"addtoany_shortcode\"><div class=\"a2a_kit a2a_kit_size_32 addtoany_list\" data-a2a-url=\"https:\/\/labs.redyops.com\/index.php\/2020\/09\/11\/ibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486\/\" data-a2a-title=\"IBM QRadar Wincollect Escalation of Privilege  (CVE-2020-4485 &amp; CVE-2020-4486)\"><a class=\"a2a_button_copy_link\" href=\"https:\/\/www.addtoany.com\/add_to\/copy_link?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F09%2F11%2Fibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486%2F&amp;linkname=IBM%20QRadar%20Wincollect%20Escalation%20of%20Privilege%20%20%28CVE-2020-4485%20%26%20CVE-2020-4486%29\" title=\"Copy Link\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_twitter\" href=\"https:\/\/www.addtoany.com\/add_to\/twitter?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F09%2F11%2Fibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486%2F&amp;linkname=IBM%20QRadar%20Wincollect%20Escalation%20of%20Privilege%20%20%28CVE-2020-4485%20%26%20CVE-2020-4486%29\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_facebook\" href=\"https:\/\/www.addtoany.com\/add_to\/facebook?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F09%2F11%2Fibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486%2F&amp;linkname=IBM%20QRadar%20Wincollect%20Escalation%20of%20Privilege%20%20%28CVE-2020-4485%20%26%20CVE-2020-4486%29\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_linkedin\" href=\"https:\/\/www.addtoany.com\/add_to\/linkedin?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F09%2F11%2Fibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486%2F&amp;linkname=IBM%20QRadar%20Wincollect%20Escalation%20of%20Privilege%20%20%28CVE-2020-4485%20%26%20CVE-2020-4486%29\" title=\"LinkedIn\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_whatsapp\" href=\"https:\/\/www.addtoany.com\/add_to\/whatsapp?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F09%2F11%2Fibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486%2F&amp;linkname=IBM%20QRadar%20Wincollect%20Escalation%20of%20Privilege%20%20%28CVE-2020-4485%20%26%20CVE-2020-4486%29\" title=\"WhatsApp\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_viber\" href=\"https:\/\/www.addtoany.com\/add_to\/viber?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F09%2F11%2Fibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486%2F&amp;linkname=IBM%20QRadar%20Wincollect%20Escalation%20of%20Privilege%20%20%28CVE-2020-4485%20%26%20CVE-2020-4486%29\" title=\"Viber\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_facebook_messenger\" href=\"https:\/\/www.addtoany.com\/add_to\/facebook_messenger?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F09%2F11%2Fibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486%2F&amp;linkname=IBM%20QRadar%20Wincollect%20Escalation%20of%20Privilege%20%20%28CVE-2020-4485%20%26%20CVE-2020-4486%29\" title=\"Messenger\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_telegram\" href=\"https:\/\/www.addtoany.com\/add_to\/telegram?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F09%2F11%2Fibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486%2F&amp;linkname=IBM%20QRadar%20Wincollect%20Escalation%20of%20Privilege%20%20%28CVE-2020-4485%20%26%20CVE-2020-4486%29\" title=\"Telegram\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_skype\" href=\"https:\/\/www.addtoany.com\/add_to\/skype?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F09%2F11%2Fibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486%2F&amp;linkname=IBM%20QRadar%20Wincollect%20Escalation%20of%20Privilege%20%20%28CVE-2020-4485%20%26%20CVE-2020-4486%29\" title=\"Skype\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_sms\" href=\"https:\/\/www.addtoany.com\/add_to\/sms?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F09%2F11%2Fibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486%2F&amp;linkname=IBM%20QRadar%20Wincollect%20Escalation%20of%20Privilege%20%20%28CVE-2020-4485%20%26%20CVE-2020-4486%29\" title=\"Message\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_dd addtoany_share_save addtoany_share\" href=\"https:\/\/www.addtoany.com\/share\"><\/a><\/div><\/div>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Resources<\/strong><\/h1>\n\n\n\n<p><strong>GitHub<\/strong><\/p>\n\n\n\n<p>You can find our exploits code in our GitHub at&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/github.com\/RedyOpsResearchLabs\/\" target=\"_blank\">https:\/\/github.com\/RedyOpsResearchLabs\/<\/a> <\/p>\n\n\n\n<p><strong>RedyOps team<\/strong><\/p>\n\n\n\n<p>RedyOps team, uses the 0-day exploits produced by Research Labs, before vendor releases any patch. They use it in special engagements and only for specific customers.<\/p>\n\n\n\n<p>You can find RedyOps team at&nbsp;<a href=\"https:\/\/redyops.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/redyops.com\/<\/a><\/p>\n\n\n\n<p><strong>Angel<\/strong><\/p>\n\n\n\n<p>Discovered 0-days which affect marine sector, are being contacted with the Angel Team. ANGEL has been designed and developed to meet the unique and diverse requirements of the merchant marine sector. It secures the vessel\u2019s business, IoT and crew networks by providing oversight, security threat alerting and control of the vessel\u2019s entire network.<\/p>\n\n\n\n<p>You can find Angel team at&nbsp;<a href=\"https:\/\/angelcyber.gr\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/angelcyber.gr\/<\/a><\/p>\n\n\n\n<p><strong>Illicium<\/strong><\/p>\n\n\n\n<p>Our 0-days cannot win Illicium. Today\u2019s information technology landscape is threatened by modern adversary security attacks, including 0-day exploits, polymorphic malwares, APTs and targeted attacks. These threats cannot be identified and mitigated using classic detection and prevention technologies; they can mimic valid user activity, do not have a signature, and do not occur in patterns. In response to attackers\u2019 evolution, defenders now have a new kind of weapon in their arsenal: Deception.<\/p>\n\n\n\n<p>You can find Illicium team at&nbsp;<a href=\"https:\/\/deceivewithillicium.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/deceivewithillicium.com\/<\/a><\/p>\n\n\n\n<p><strong>Neutrify<\/strong><\/p>\n\n\n\n<p>Discovered 0-days are being contacted to the Neutrify team, in order to develop related detection rules. Neutrify is Neurosoft\u2019s 24\u00d77 Security Operations Center, completely dedicated to threats monitoring and attacks detection. Beyond just monitoring, Neutrify offers additional capabilities including advanced forensic analysis and malware reverse engineering to analyze incidents.<\/p>\n\n\n\n<p>You can find Neutrify team at&nbsp;<a href=\"https:\/\/neurosoft.gr\/contact\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/neurosoft.gr\/contact\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summary Assigned CVE: CVE-2020-4485 and CVE-2020-4486 have been assigned and RedyOps Labs has been publicly acknowledged by the vendor. Known to Neurosoft&#8217;s RedyOps Labs since: 13\/05\/2020 Exploit Code: N\/A Vendor&#8217;s Advisory: https:\/\/www.ibm.com\/support\/pages\/node\/6257885 An Elevation of Privilege (EoP) exists in IBM QRadar Wincollect 7.2.0 &#8211; 7.2.9 . The vulnerability described gives the ability to a low &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/labs.redyops.com\/index.php\/2020\/09\/11\/ibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;IBM QRadar Wincollect Escalation of Privilege  (CVE-2020-4485 &#038; CVE-2020-4486)&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[17,4],"tags":[22,3,28,29,30],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IBM QRadar Wincollect Escalation of Privilege<\/title>\n<meta name=\"description\" content=\"Writeup for IBM QRadar Wincollect CVE-2020-4485 and CVE-2020-4486 .\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/labs.redyops.com\/index.php\/2020\/09\/11\/ibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IBM QRadar Wincollect Escalation of Privilege\" \/>\n<meta property=\"og:description\" content=\"Writeup for IBM QRadar Wincollect CVE-2020-4485 and CVE-2020-4486 .\" \/>\n<meta property=\"og:url\" content=\"https:\/\/labs.redyops.com\/index.php\/2020\/09\/11\/ibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486\/\" \/>\n<meta property=\"og:site_name\" content=\"REDYOPS Labs\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-11T12:57:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-06T06:40:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/labs.redyops.com\/wp-content\/uploads\/2020\/09\/IBM.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1281\" \/>\n\t<meta property=\"og:image:height\" content=\"918\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"IBM QRadar Wincollect Escalation of Privilege\" \/>\n<meta name=\"twitter:description\" content=\"Writeup for IBM QRadar Wincollect CVE-2020-4485 and CVE-2020-4486 .\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/labs.redyops.com\/wp-content\/uploads\/2020\/09\/IBM.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/labs.redyops.com\/index.php\/2020\/09\/11\/ibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486\/\",\"url\":\"https:\/\/labs.redyops.com\/index.php\/2020\/09\/11\/ibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486\/\",\"name\":\"IBM QRadar Wincollect Escalation of Privilege\",\"isPartOf\":{\"@id\":\"https:\/\/labs.redyops.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/labs.redyops.com\/index.php\/2020\/09\/11\/ibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/labs.redyops.com\/index.php\/2020\/09\/11\/ibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/labs.redyops.com\/wp-content\/uploads\/2020\/09\/IBM.png\",\"datePublished\":\"2020-09-11T12:57:19+00:00\",\"dateModified\":\"2021-10-06T06:40:27+00:00\",\"author\":{\"@id\":\"https:\/\/labs.redyops.com\/#\/schema\/person\/b71c37b49c3ccdc96f0095d5e4161b69\"},\"description\":\"Writeup for IBM QRadar Wincollect CVE-2020-4485 and CVE-2020-4486 .\",\"breadcrumb\":{\"@id\":\"https:\/\/labs.redyops.com\/index.php\/2020\/09\/11\/ibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/labs.redyops.com\/index.php\/2020\/09\/11\/ibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/labs.redyops.com\/index.php\/2020\/09\/11\/ibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486\/#primaryimage\",\"url\":\"https:\/\/labs.redyops.com\/wp-content\/uploads\/2020\/09\/IBM.png\",\"contentUrl\":\"https:\/\/labs.redyops.com\/wp-content\/uploads\/2020\/09\/IBM.png\",\"width\":1281,\"height\":918},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/labs.redyops.com\/index.php\/2020\/09\/11\/ibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/labs.redyops.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IBM QRadar Wincollect Escalation of Privilege (CVE-2020-4485 &#038; CVE-2020-4486)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/labs.redyops.com\/#website\",\"url\":\"https:\/\/labs.redyops.com\/\",\"name\":\"REDYOPS Labs\",\"description\":\"Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/labs.redyops.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/labs.redyops.com\/#\/schema\/person\/b71c37b49c3ccdc96f0095d5e4161b69\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/labs.redyops.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c7bde3be8234c04475e6f42bb697f356?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c7bde3be8234c04475e6f42bb697f356?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/labs.redyops.com\"],\"url\":\"https:\/\/labs.redyops.com\/index.php\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IBM QRadar Wincollect Escalation of Privilege","description":"Writeup for IBM QRadar Wincollect CVE-2020-4485 and CVE-2020-4486 .","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/labs.redyops.com\/index.php\/2020\/09\/11\/ibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486\/","og_locale":"en_US","og_type":"article","og_title":"IBM QRadar Wincollect Escalation of Privilege","og_description":"Writeup for IBM QRadar Wincollect CVE-2020-4485 and CVE-2020-4486 .","og_url":"https:\/\/labs.redyops.com\/index.php\/2020\/09\/11\/ibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486\/","og_site_name":"REDYOPS Labs","article_published_time":"2020-09-11T12:57:19+00:00","article_modified_time":"2021-10-06T06:40:27+00:00","og_image":[{"width":1281,"height":918,"url":"https:\/\/labs.redyops.com\/wp-content\/uploads\/2020\/09\/IBM.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"IBM QRadar Wincollect Escalation of Privilege","twitter_description":"Writeup for IBM QRadar Wincollect CVE-2020-4485 and CVE-2020-4486 .","twitter_image":"https:\/\/labs.redyops.com\/wp-content\/uploads\/2020\/09\/IBM.png","twitter_misc":{"Written by":"admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/labs.redyops.com\/index.php\/2020\/09\/11\/ibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486\/","url":"https:\/\/labs.redyops.com\/index.php\/2020\/09\/11\/ibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486\/","name":"IBM QRadar Wincollect Escalation of Privilege","isPartOf":{"@id":"https:\/\/labs.redyops.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/labs.redyops.com\/index.php\/2020\/09\/11\/ibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486\/#primaryimage"},"image":{"@id":"https:\/\/labs.redyops.com\/index.php\/2020\/09\/11\/ibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486\/#primaryimage"},"thumbnailUrl":"http:\/\/labs.redyops.com\/wp-content\/uploads\/2020\/09\/IBM.png","datePublished":"2020-09-11T12:57:19+00:00","dateModified":"2021-10-06T06:40:27+00:00","author":{"@id":"https:\/\/labs.redyops.com\/#\/schema\/person\/b71c37b49c3ccdc96f0095d5e4161b69"},"description":"Writeup for IBM QRadar Wincollect CVE-2020-4485 and CVE-2020-4486 .","breadcrumb":{"@id":"https:\/\/labs.redyops.com\/index.php\/2020\/09\/11\/ibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/labs.redyops.com\/index.php\/2020\/09\/11\/ibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/labs.redyops.com\/index.php\/2020\/09\/11\/ibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486\/#primaryimage","url":"https:\/\/labs.redyops.com\/wp-content\/uploads\/2020\/09\/IBM.png","contentUrl":"https:\/\/labs.redyops.com\/wp-content\/uploads\/2020\/09\/IBM.png","width":1281,"height":918},{"@type":"BreadcrumbList","@id":"https:\/\/labs.redyops.com\/index.php\/2020\/09\/11\/ibm-qradar-wincollect-escalation-of-privileges-cve-2020-4485-cve-2020-4486\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/labs.redyops.com\/"},{"@type":"ListItem","position":2,"name":"IBM QRadar Wincollect Escalation of Privilege (CVE-2020-4485 &#038; CVE-2020-4486)"}]},{"@type":"WebSite","@id":"https:\/\/labs.redyops.com\/#website","url":"https:\/\/labs.redyops.com\/","name":"REDYOPS Labs","description":"Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/labs.redyops.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/labs.redyops.com\/#\/schema\/person\/b71c37b49c3ccdc96f0095d5e4161b69","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/labs.redyops.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c7bde3be8234c04475e6f42bb697f356?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c7bde3be8234c04475e6f42bb697f356?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/labs.redyops.com"],"url":"https:\/\/labs.redyops.com\/index.php\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/posts\/305"}],"collection":[{"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/comments?post=305"}],"version-history":[{"count":14,"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/posts\/305\/revisions"}],"predecessor-version":[{"id":330,"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/posts\/305\/revisions\/330"}],"wp:attachment":[{"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/media?parent=305"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/categories?post=305"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/tags?post=305"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}