Windows Kernel Elevation of Privilege Vulnerability (CVE-2020-1027)
An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.
Vulnerability ID
CVE-2020-1027
Vulnerability Name
Windows Kernel Elevation of Privilege Vulnerability
Vulnerability Details
An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
Scope of Impact
All Windows OSs
Official Solution
It is recommended that affected users install the latest vulnerability patch as soon as possible.
For details, see https://msrc.microsoft.com/update-guide/en-us/vulnerability/CVE-2020-1027.
Suggestion
Perform the following steps to scan and fix a vulnerability.
- Scan for and view vulnerability details.
For details, see Vulnerability Scan and Viewing Vulnerability Details.
- Fix vulnerabilities and verify the fix.
For details, see Handling Vulnerabilities.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot