Unrated severityNVD Advisory· Published Aug 17, 2020· Updated Aug 4, 2024
Windows Registry Elevation of Privilege Vulnerability
CVE-2020-1377
Description
An elevation of privilege vulnerability exists when the Windows Kernel API improperly handles registry objects in memory. An attacker who successfully exploited the vulnerability could gain elevated privileges on a targeted system. A locally authenticated attacker could exploit this vulnerability by running a specially crafted application. The security update addresses the vulnerability by helping to ensure that the Windows Kernel API properly handles objects in memory.
Affected products
13cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*+ 1 more
- cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*range: 10.0.0
- cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*range: 10.0.0
cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*range: 10.0.0
- cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*range: 10.0.0
- cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*Range: 6.2.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.