diff --git a/modules/exploits/windows/local/cve_2020_0668_service_tracing.rb b/modules/exploits/windows/local/cve_2020_0668_service_tracing.rb index 629d097e29fd..a2ab61079da6 100644 --- a/modules/exploits/windows/local/cve_2020_0668_service_tracing.rb +++ b/modules/exploits/windows/local/cve_2020_0668_service_tracing.rb @@ -261,7 +261,6 @@ def exploit # start file copy rastapi_privileged_filecopy(payload_dll, exploit_dir, upload_payload_pathname, target_payload_pathname) - # launch trigger launch_dll_trigger print_warning("Manual cleanup after reboot required for #{target_payload_pathname} and #{exploit_dir}") @@ -285,8 +284,7 @@ def validate_target end version_info = get_version_info - vprint_status("Version: #{version_info.number}") - unless version_info.build_version.between?(Msf::WindowsVersion::Win10_1803, Msf::WindowsVersion::Win10_1909) + unless version_info.build_number.between?(Msf::WindowsVersion::Win10_1803, Msf::WindowsVersion::Win10_1909) fail_with(Failure::NotVulnerable, 'The exploit only supports Windows 10 build versions 17134-18363') end end