An elevation of privilege vulnerability exists in the way that the Windows kernel image handles objects in memory.An attacker who successfully exploited the vulnerability could execute code with elevated permissions.To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.The security update addresses the vulnerability by ensuring the Windows kernel image properly handles objects in memory., aka 'Windows Image Elevation of Privilege Vulnerability'.
References
Link | Resource |
---|---|
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16892 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-10-16 16:15
Updated : 2021-07-21 04:39
NVD link : CVE-2020-16892
Mitre link : CVE-2020-16892
JSON object : View
CWE
Products Affected
microsoft
- windows_server_2016
- windows_rt_8.1
- windows_server_2019
- windows_8.1
- windows_10
- windows_server_2012