First published: Fri Sep 11 2020(Updated: )
<p>An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.</p> <p>In a local attack scenario, an attacker could exploit this vulnerability by running a specially crafted application to take control over the affected system.</p> <p>The update addresses the vulnerability by correcting the way in which the Microsoft Graphics Component handles objects in memory and preventing unintended elevation from user mode.</p>
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Windows 10 | ||
Windows 10 | ||
Windows 10 | =1607 | |
Windows 10 | =1607 | |
Windows 10 | =1709 | |
Windows 10 | =1803 | |
Windows 10 | =1809 | |
Windows 10 | =1903 | |
Windows 10 | =1909 | |
Windows 10 | =2004 | |
Microsoft Windows | ||
Microsoft Windows | ||
Microsoft Windows RT | ||
Microsoft Windows Server | =r2 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | =1903 | |
Microsoft Windows Server 2016 | =1909 | |
Microsoft Windows Server 2016 | =2004 | |
Microsoft Windows Server 2019 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-0998 has a severity rating of important, indicating a significant impact due to potential elevation of privilege.
To fix CVE-2020-0998, apply the latest updates provided by Microsoft for affected versions of Windows.
CVE-2020-0998 affects various versions of Windows 10, Windows 8.1, and Windows Server, including specific builds.
CVE-2020-0998 enables a local attacker to execute processes with elevated privileges on the affected systems.
You can determine if your system is vulnerable to CVE-2020-0998 by checking the installed version of Windows against the list of affected versions.