TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2020-16892

HIGH
7.8

Beschreibung

<p>An elevation of privilege vulnerability exists in the way that the Windows kernel image handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.</p> <p>To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.</p> <p>The security update addresses the vulnerability by ensuring the Windows kernel image properly handles objects in memory.</p>

CVE Details

CVSS v3.1 Bewertung7.8
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorLOCAL
KomplexitatLOW
Erforderliche PrivilegienLOW
BenutzerinteraktionNONE
Veroffentlicht10/16/2020
Zuletzt geandert2/23/2026
Quellenvd
Honeypot-Sichtungen0

Betroffene Produkte

microsoft:windows_10microsoft:windows_8.1microsoft:windows_rt_8.1microsoft:windows_server_2012microsoft:windows_server_2016microsoft:windows_server_2019

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.