CVE-2020-16913

4 documents4 sources
Severity
7.8HIGH
EPSS
0.5%
top 32.40%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 16
Latest updateMay 24

Description

An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application th

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages14 packages

Patches

🔴Vulnerability Details

2
GHSA
GHSA-97h7-f4f7-86x2: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka 'Win32k2022-05-24
CVEList
Win32k Elevation of Privilege Vulnerability2020-10-16

📋Vendor Advisories

1
Microsoft
Win32k Elevation of Privilege Vulnerability2020-10-13
CVE-2020-16913 (HIGH CVSS 7.8) | An elevation of privilege vulnerabi | cvebase.io