CVE-2020-1578
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
17/08/2020
Last modified:
23/02/2026
Description
An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass. An attacker who successfully exploited the vulnerability could retrieve the memory address of a kernel object.<br />
To exploit the vulnerability, an attacker would have to log on to an affected system and run a specially crafted application.<br />
The security update addresses the vulnerability by correcting how the Windows kernel handles memory addresses.
Impact
Base Score 3.x
4.70
Severity 3.x
MEDIUM
Base Score 2.0
1.90
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



