{"vulnerability": "CVE-2020-13162", "sightings": [{"uuid": "46890ec3-ef00-4830-8f7c-f91ac24ec841", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13162", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14932", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2020-13162\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A time-of-check time-of-use vulnerability in PulseSecureService.exe in Pulse Secure Client versions prior to 9.1.6 down to 5.3 R70 for Windows (which runs as NT AUTHORITY/SYSTEM) allows unprivileged users to run a Microsoft Installer executable with elevated privileges.\n\ud83d\udccf Published: 2020-06-16T19:41:18.000Z\n\ud83d\udccf Modified: 2025-05-05T17:08:09.077Z\n\ud83d\udd17 References:\n1. https://kb.pulsesecure.net/?atype=sa\n2. https://twitter.com/sepcali/status/1262551597990711296\n3. http://seclists.org/fulldisclosure/2020/Jun/25\n4. https://www.redtimmy.com/privilege-escalation/pulse-secure-client-for-windows-9-1-6-toctou-privilege-escalation-cve-2020-13162/\n5. http://packetstormsecurity.com/files/158117/Pulse-Secure-Client-For-Windows-Local-Privilege-Escalation.html\n6. https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44503\n7. https://twitter.com/gsepcali/status/1262551597990711296\n8. https://twitter.com/gsepcali/status/1272927080909623297\n9. http://seclists.org/fulldisclosure/2020/Sep/15\n10. http://packetstormsecurity.com/files/159065/Pulse-Secure-Windows-Client-Privilege-Escalation.html", "creation_timestamp": "2025-05-05T17:20:18.000000Z"}, {"uuid": "1ea1b104-6ed0-4043-b41b-c5702ef608e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13162", "type": "published-proof-of-concept", "source": "https://t.me/cKure/2062", "content": "\u25a0\u25a0\u25a0\u25a0\u25a1 Pulse Secure Windows Client &lt;9.1.6 (CVE-2020-13162) - exploit\n\nhttps://github.com/redtimmy/tu-TOCTOU-kaiu-TOCMEU-CVE-2020-13162-\n\nhttps://www.redtimmy.com/privilege-escalation/pulse-secure-windows-client/", "creation_timestamp": "2020-09-02T20:27:54.000000Z"}, {"uuid": "66da3269-e0e4-4f5d-9ed3-5a373e9b1e39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13162", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1280", "content": "#Threat_Research\nCVE-2020-13162 - Pulse Secure Client for Windows &lt;9.1.6 TOCTOU Privilege Escalation\nhttps://www.redtimmy.com/privilege-escalation/pulse-secure-client-for-windows-9-1-6-toctou-privilege-escalation-cve-2020-13162", "creation_timestamp": "2021-01-03T19:40:31.000000Z"}, {"uuid": "4e6d8c6d-3493-4315-8e45-38a9c5d12483", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13162", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1689", "content": "Pulse Secure Windows Client &lt;9.1.6 (CVE-2020-13162) - Exploit\nhttps://www.redtimmy.com/privilege-escalation/pulse-secure-windows-client/\nPoC:\nhttps://github.com/redtimmy/tu-TOCTOU-kaiu-TOCMEU-CVE-2020-13162-", "creation_timestamp": "2020-09-03T11:07:01.000000Z"}]}