TROYANOSYVIRUS
Back to CVEs

CVE-2020-16907

HIGH
7.8

Description

<p>An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.</p> <p>The update addresses this vulnerability by correcting how the Windows kernel-mode driver handles objects in memory.</p>

CVE Details

CVSS v3.1 Score7.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published10/16/2020
Last Modified2/23/2026
Sourcenvd
Honeypot Sightings0

Affected Products

microsoft:windows_10microsoft:windows_server_2016microsoft:windows_server_2019

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.