First published: Tue Jun 09 2020(Updated: )
An elevation of privilege (user to user) vulnerability exists in Windows Security Health Service when handling certain objects in memory.To exploit the vulnerability, an attacker would first have to log on to the system, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1162.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 10 | =1709 | |
Microsoft Windows 10 | =1803 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =1903 | |
Microsoft Windows 10 | =1909 | |
Microsoft Windows 10 | =2004 | |
Microsoft Windows Server 2016 | =1803 | |
Microsoft Windows Server 2016 | =1903 | |
Microsoft Windows Server 2016 | =1909 | |
Microsoft Windows Server 2016 | =2004 | |
Microsoft Windows Server 2019 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1324 has a severity rating of Important in Microsoft's security classification.
To fix CVE-2020-1324, you need to apply the security updates provided by Microsoft for the affected Windows versions.
CVE-2020-1324 affects Windows 10 versions 1709, 1803, 1809, 1903, 1909, 2004, and Windows Server 2016 as well as Windows Server 2019.
No, CVE-2020-1324 requires an attacker to log on to the system to exploit the vulnerability.
CVE-2020-1324 is classified as an elevation of privilege vulnerability.