7.8
CVE-2020-1034
- EPSS 17.02%
- Veröffentlicht 11.09.2020 17:15:18
- Zuletzt bearbeitet 21.11.2024 05:09:36
- Quelle secure@microsoft.com
- CVE-Watchlists
- Unerledigt
<p>An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.</p> <p>To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.</p> <p>The security update addresses the vulnerability by ensuring the Windows Kernel properly handles objects in memory.</p>
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Microsoft ≫ Windows 10 Version-
Microsoft ≫ Windows 10 Version1607
Microsoft ≫ Windows 10 Version1709
Microsoft ≫ Windows 10 Version1803
Microsoft ≫ Windows 10 Version1809
Microsoft ≫ Windows 10 Version1903
Microsoft ≫ Windows 10 Version1909
Microsoft ≫ Windows 10 Version2004
Microsoft ≫ Windows 8.1 Version-
Microsoft ≫ Windows Rt 8.1 Version-
Microsoft ≫ Windows Server 2012 Version-
Microsoft ≫ Windows Server 2012 Versionr2
Microsoft ≫ Windows Server 2016 Version-
Microsoft ≫ Windows Server 2016 Version1903
Microsoft ≫ Windows Server 2016 Version1909
Microsoft ≫ Windows Server 2016 Version2004
Microsoft ≫ Windows Server 2019 Version-
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 17.02% | 0.947 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.2 | 3.9 | 10 |
AV:L/AC:L/Au:N/C:C/I:C/A:C
|
| nvd@nist.gov | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
| secure@microsoft.com | 6.8 | 2.5 | 4.2 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
|