CVE-2020-36938
Published: 27 January 2026
Summary
CVE-2020-36938 is a high-severity Incorrect Permission Assignment for Critical Resource (CWE-732) vulnerability. Its CVSS base score is 8.8 (High).
Operationally, ranked at the 9.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-6 (Least Privilege) and CM-5 (Access Restrictions for Change).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prohibits modification of critical executable programs and DLLs in the WinAVR installation directory exploited via insecure permissions.
Authorizes and restricts access to change system components like the vulnerable executables and DLLs in the installation directory.
Applies least privilege to deny low-privileged authenticated users write access to critical system files despite overly permissive directory permissions.
NVD Description
WinAVR version 20100110 contains an insecure permissions vulnerability that allows authenticated users to modify system files and executables. Attackers can leverage the overly permissive access controls to potentially modify critical DLLs and executable files in the WinAVR installation directory.
Deeper analysisAI
CVE-2020-36938 is an insecure permissions vulnerability (CWE-732) affecting WinAVR version 20100110. The issue arises from overly permissive access controls in the WinAVR installation directory, enabling authenticated users to modify system files and executables, including critical DLLs.
The vulnerability has a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating exploitation over the network with low complexity, requiring only low privileges such as an authenticated user account, and no user interaction. Attackers can leverage this to modify critical files, potentially achieving high-impact compromise of confidentiality, integrity, and availability on affected systems.
Advisories, including one from VulnCheck on the insecure folder permissions, provide further details, while an exploit is documented on Exploit-DB (ID 49379). The WinAVR project page on SourceForge offers additional context on the software. No specific patches are detailed in the available information.
Details
- CWE(s)