First published: Fri Oct 16 2020(Updated: )
<p>An information disclosure vulnerability exists in Text Services Framework when it fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could potentially read data that was not intended to be disclosed. Note that this vulnerability would not allow an attacker to execute code or to elevate their user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system.</p> <p>To exploit this vulnerability, an attacker would have to log on to an affected system and open a specially crafted file.</p> <p>The update addresses the vulnerability by correcting how Text Services Framework handles objects in memory.</p>
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Windows 10 | =1709 | |
Windows 10 | =1803 | |
Windows 10 | =1809 | |
Windows 10 | =1903 | |
Windows 10 | =1909 | |
Windows 10 | =2004 | |
Microsoft Windows Server 2016 | =1903 | |
Microsoft Windows Server 2016 | =1909 | |
Microsoft Windows Server 2016 | =2004 | |
Microsoft Windows Server 2019 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-16921 has a severity rating of important, indicating a moderate risk to affected systems.
To mitigate CVE-2020-16921, users should apply the latest security updates released by Microsoft for their affected software versions.
CVE-2020-16921 affects multiple versions of Microsoft Windows 10 and Windows Server 2016 and 2019.
Yes, if exploited, CVE-2020-16921 can allow attackers to read sensitive data that was not intended to be disclosed.
Exploitation of CVE-2020-16921 requires an attacker to have access to the affected system, which may limit the potential impact.