An elevation of privilege vulnerability exists when the Windows Background Intelligent Transfer Service (BITS) improperly handles symbolic links, aka 'Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability'.
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-242a
https://www.tenable.com/cyber-exposure/a-look-inside-the-ransomware-ecosystem
https://unit42.paloaltonetworks.com/lockbit-2-ransomware/
https://www.cisa.gov/news-events/cybersecurity-advisories/aa21-209a
https://www.tenable.com/blog/analyzing-the-vulnerabilities-associated-with-the-top-malware-strains-of-2021
https://www.tenable.com/blog/contileaks-chats-reveal-over-30-vulnerabilities-used-by-conti-ransomware-affiliates
https://www.tenable.com/blog/examining-the-treat-landscape
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0787
http://packetstormsecurity.com/files/158056/Background-Intelligent-Transfer-Service-Privilege-Escalation.html
Source: Mitre, NVD
Published: 2020-03-12
Updated: 2025-04-04
Known Exploited Vulnerability (KEV)
Base Score: 7.2
Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
Severity: High
Base Score: 7.8
Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS: 0.58