First published: Fri Sep 11 2020(Updated: )
<p>An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory.</p> <p>To exploit this vulnerability, an authenticated attacker could run a specially crafted application. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.</p> <p>The update addresses the vulnerability by correcting how the Windows kernel initializes objects in memory.</p>
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
=1803 | ||
=1809 | ||
=1903 | ||
=1909 | ||
=2004 | ||
=1903 | ||
=1909 | ||
=2004 | ||
Microsoft Windows 10 | =1803 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =1903 | |
Microsoft Windows 10 | =1909 | |
Microsoft Windows 10 | =2004 | |
Microsoft Windows Server 2016 | =1903 | |
Microsoft Windows Server 2016 | =1909 | |
Microsoft Windows Server 2016 | =2004 | |
Microsoft Windows Server 2019 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1592 is classified as a moderate severity vulnerability due to the potential for information disclosure.
CVE-2020-1592 affects Windows 10 versions 1803, 1809, 1903, 1909, and 2004, as well as Windows Server versions 2016 and 2019.
To fix CVE-2020-1592, apply the latest security updates provided by Microsoft for the affected Windows versions.
CVE-2020-1592 requires an authenticated attacker to exploit the vulnerability, meaning it cannot be exploited remotely without access.
Exploiting CVE-2020-1592 could allow an attacker to gain unauthorized access to sensitive information stored in memory.