First published: Thu May 21 2020(Updated: )
An elevation of privilege vulnerability exists when Windows improperly handles errors tied to Remote Access Common Dialog, aka 'Windows Remote Access Common Dialog Elevation of Privilege Vulnerability'.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Windows 10 | ||
Windows 10 | =1607 | |
Windows 10 | =1709 | |
Windows 10 | =1803 | |
Windows 10 | =1809 | |
Windows 10 | =1903 | |
Windows 10 | =1909 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows | ||
Microsoft Windows RT | ||
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =r2 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2019 | =1903 | |
Microsoft Windows Server 2019 | =1909 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1071 has a severity rating of important as it can lead to elevation of privilege.
To fix CVE-2020-1071, you should apply the security updates released by Microsoft for affected versions of Windows.
CVE-2020-1071 affects multiple versions of Windows including Windows 7, 8.1, Windows 10, and various Windows Server editions.
No, exploitation of CVE-2020-1071 results in elevation of privilege but does not allow remote code execution.
Currently, there are no known workarounds for CVE-2020-1071, and it is recommended to apply updates as soon as possible.