First published: Fri Oct 16 2020(Updated: )
<p>An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.</p> <p>To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.</p> <p>The security update addresses the vulnerability by correcting how the Windows Backup Service handles file operations.</p>
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 10 | ||
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =1709 | |
Microsoft Windows 10 | =1803 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =1903 | |
Microsoft Windows 10 | =1909 | |
Microsoft Windows 10 | =2004 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | =1903 | |
Microsoft Windows Server 2016 | =1909 | |
Microsoft Windows Server 2016 | =2004 | |
Microsoft Windows Server 2019 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-16973 is rated as important by Microsoft due to its potential for elevation of privilege.
To fix CVE-2020-16973, apply the relevant security updates provided by Microsoft for your affected version of Windows.
CVE-2020-16973 affects several versions of Windows including Windows 10, Windows 7, Windows Server 2016, and Windows Server 2019.
CVE-2020-16973 is an elevation of privilege vulnerability that arises from improper handling of file operations by the Windows Backup Service.
No, CVE-2020-16973 cannot be exploited remotely as the attacker must first gain execution on the victim system.