CVE-2020-1252: Windows Remote Code Execution Vulnerability

Overview

Severity
High (CVSS 7.8)
CVSS Vector
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
Category
Remote Code Execution
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2020-Sep
Released
2020-09-08
Last Updated
2020-09-08
EPSS Score
12.08% (percentile: 93.8%)

Description

A remote code execution vulnerability exists when Windows improperly handles objects in memory. To exploit the vulnerability an attacker would have to convince a user to run a specially crafted application. An attacker who successfully exploited this vulnerability could execute arbitrary code and take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. The updates address the vulnerability by correcting how Windows handles objects in memory.

Affected Products (44)

Other

  • 11497
  • 11498
  • 11563
  • 11568
  • 11569
  • 11570
  • 11571
  • 11572
  • 11712
  • 11713
  • 11714
  • 11715
  • 11453
  • 11454
  • 11583
  • 11644
  • 11645
  • 11646
  • 11647
  • 11766
  • 11767
  • 11768
  • 11769
  • 10729
  • 10735
  • 10852
  • 10853
  • 10816
  • 10855
  • 10047
  • 10048
  • 10481
  • 10482
  • 10484
  • 9312
  • 10287
  • 9318
  • 9344
  • 10051
  • 10049
  • 10378
  • 10379
  • 10483
  • 10543

Security Updates (15)

Acknowledgments

Kakushi Gotou

Revision History

  • 2020-09-08: Information published.
  • 2020-09-08: Updated vulnerability description.