CVE-2020-16913
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
16/10/2020
Last modified:
31/12/2023
Description
An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.<br />
To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.<br />
The update addresses this vulnerability by correcting how the Windows kernel-mode driver handles objects in memory.<br />
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Base Score 2.0
7.20
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page