CVE-2020-16890

4 documents4 sources
Severity
7.8HIGH
EPSS
0.5%
top 32.40%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 16
Latest updateMay 24

Description

An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an aff

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages14 packages

Patches

🔴Vulnerability Details

2
GHSA
GHSA-m2cc-qv47-86r8: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Pr2022-05-24
CVEList
Windows Kernel Elevation of Privilege Vulnerability2020-10-16

📋Vendor Advisories

1
Microsoft
Windows Kernel Elevation of Privilege Vulnerability2020-10-13
CVE-2020-16890 (HIGH CVSS 7.8) | An elevation of privilege vulnerabi | cvebase.io