CVE-2020-1252: Windows Remote Code Execution Vulnerability
Overview
- Severity
- High (CVSS 7.8)
- CVSS Vector
- CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
- Category
- Remote Code Execution
- Exploit Status
- Not Exploited
- Exploitation Likelihood
- Less Likely
- Patch Tuesday
- 2020-Sep
- Released
- 2020-09-08
- Last Updated
- 2020-09-08
- EPSS Score
- 12.08% (percentile: 93.8%)
Description
A remote code execution vulnerability exists when Windows improperly handles objects in memory. To exploit the vulnerability an attacker would have to convince a user to run a specially crafted application.
An attacker who successfully exploited this vulnerability could execute arbitrary code and take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
The updates address the vulnerability by correcting how Windows handles objects in memory.
Affected Products (44)
Other
- 11497
- 11498
- 11563
- 11568
- 11569
- 11570
- 11571
- 11572
- 11712
- 11713
- 11714
- 11715
- 11453
- 11454
- 11583
- 11644
- 11645
- 11646
- 11647
- 11766
- 11767
- 11768
- 11769
- 10729
- 10735
- 10852
- 10853
- 10816
- 10855
- 10047
- 10048
- 10481
- 10482
- 10484
- 9312
- 10287
- 9318
- 9344
- 10051
- 10049
- 10378
- 10379
- 10483
- 10543
Security Updates (15)
Acknowledgments
Kakushi Gotou
Revision History
- 2020-09-08: Information published.
- 2020-09-08: Updated vulnerability description.