CVE-2020-16940

EUVD-2020-8898
<p>An elevation of privilege vulnerability exists when the Windows User Profile Service (ProfSvc) improperly handles junction points. An attacker who successfully exploited this vulnerability could delete files and folders in an elevated context.</p>
<p>To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and delete files or folders of their choosing.</p>
<p>The security update addresses the vulnerability by correcting how the Windows User Profile Service handles junction points.</p>
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
microsoftCNA
7.8 HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
Base Score
CVSS 3.x
EPSS Score
Percentile: 54%
Affected Products (NVD)
VendorProductVersion
microsoftwindows_10
-
microsoftwindows_7
-
microsoftwindows_8.1
-
microsoftwindows_rt_8.1
-
microsoftwindows_server_2008
-
microsoftwindows_server_2012
-
microsoftwindows_server_2016
-
microsoftwindows_server_2019
-
𝑥
= Vulnerable software versions
Windows Releases
Platform
Version
Windows 10
(x64, x86)
1607 (x64, x86)
1709 (arm64, x64, x86)
1803 (arm64, x64, x86)
1809 (arm64, x64, x86)
1903 (arm64, x64, x86)
1909 (arm64, x64, x86)
2004 (arm64, x64, x86)
Windows 7
Service Pack 1 (x64, x86)
Windows 8.1
(x64, x86)
(x64, x86)
Windows RT 8.1
All
Windows Server
1903 Server Core
1909 Server Core
2004 Server Core
Windows Server 2008
Service Pack 2 (x64, x86)
Service Pack 2 Server Core (x64, x86)
Windows Server 2008 R2
Service Pack 1 (x64)
Service Pack 1 Server Core (x64)
Windows Server 2012
Server Core
Standard
Windows Server 2012 R2
Server Core
Server Core
Standard
Standard
Windows Server 2016
Server Core
Standard
Windows Server 2019
Server Core
Standard