CVE-2020-0732: DirectX Elevation of Privilege Vulnerability

Overview

Severity
High (CVSS 7)
CVSS Vector
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
Category
Elevation of Privilege
Exploit Status
Not Exploited
Patch Tuesday
2020-Feb
Released
2020-02-11
Last Updated
2020-02-12
EPSS Score
0.54% (percentile: 67.6%)

Description

An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses the vulnerability by correcting how DirectX handles objects in memory.

Affected Products (6)

Windows

  • Windows 10 for 32-bit Systems
  • Windows 10 for x64-based Systems
  • Windows 10 Version 1607 for 32-bit Systems
  • Windows 10 Version 1607 for x64-based Systems
  • Windows Server 2016
  • Windows Server 2016 (Server Core installation)

Security Updates (2)

Acknowledgments

<a href="https://twitter.com/flame36987044">liuxiaoliang</a> and <a href="http://weibo.com/jfpan">pjf</a> of IceSword Lab , Qihoo 360</a>

Revision History

  • 2020-02-11: Information published.
  • 2020-02-12: Updated acknowledgment. This is an informational change only.