First published: Tue Jun 09 2020(Updated: )
A security feature bypass vulnerability exists when Windows Host Guardian Service improperly handles hashes recorded and logged, aka 'Windows Host Guardian Service Security Feature Bypass Vulnerability'.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Windows 10 | ||
Windows 10 | ||
Windows 10 | =1607 | |
Windows 10 | =1607 | |
Windows 10 | =1709 | |
Windows 10 | =1809 | |
Windows 10 | =1903 | |
Windows 10 | =1909 | |
Windows 10 | =2004 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | =1803 | |
Microsoft Windows Server 2016 | =1903 | |
Microsoft Windows Server 2016 | =1909 | |
Microsoft Windows Server 2016 | =2004 | |
Microsoft Windows Server 2019 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1259 has a severity rating of Important, indicating a significant security risk.
To address CVE-2020-1259, it is essential to apply the latest security updates provided by Microsoft.
CVE-2020-1259 affects multiple versions of Microsoft Windows 10 and Windows Server 2016 and 2019.
CVE-2020-1259 is classified as a security feature bypass vulnerability.
CVE-2020-1259 requires local access to exploit, which limits its impact to local users.