Windows Kernel Elevation of Privilege Vulnerability (CVE-2020-1027)
An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.
Vulnerability ID
CVE-2020-1027
Vulnerability Name
Windows Kernel Elevation of Privilege Vulnerability
Vulnerability Details
An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
Affected Versions
All Windows OSs
Official Solution
It is recommended that affected users install the latest vulnerability patch as soon as possible.
For details, see https://msrc.microsoft.com/update-guide/en-us/vulnerability/CVE-2020-1027.
Suggestion
Perform the following steps to scan and fix a vulnerability.
- Detect and view vulnerability details. For details, see Viewing Vulnerability Details.
Figure 1 Manually starting a vulnerability scan
- Fix vulnerabilities and verify the result. For details, see Handling Vulnerabilities..
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot