CVE-2020-16892
EUVD-2020-885016.10.2020, 23:15
<p>An elevation of privilege vulnerability exists in the way that the Windows kernel image handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.</p> <p>To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.</p> <p>The security update addresses the vulnerability by ensuring the Windows kernel image properly handles objects in memory.</p>Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| microsoft | windows_10 | - |
| microsoft | windows_8.1 | - |
| microsoft | windows_rt_8.1 | - |
| microsoft | windows_server_2012 | - |
| microsoft | windows_server_2016 | - |
| microsoft | windows_server_2019 | - |
𝑥
= Vulnerable software versions
Windows Releases
Platform | Version | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Windows 10 |
| ||||||||||||||||
| Windows 8.1 |
| ||||||||||||||||
| Windows RT 8.1 |
| ||||||||||||||||
| Windows Server |
| ||||||||||||||||
| Windows Server 2012 |
| ||||||||||||||||
| Windows Server 2012 R2 |
| ||||||||||||||||
| Windows Server 2016 |
| ||||||||||||||||
| Windows Server 2019 |
|