Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-1378— Windows Registry Elevation of Privilege Vulnerability

CVSS 7.5 · High EPSS 2.23% · P85
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-1378

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Windows Registry Elevation of Privilege Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
An elevation of privilege vulnerability exists when the Windows Kernel API improperly handles registry objects in memory. An attacker who successfully exploited the vulnerability could gain elevated privileges on a targeted system. A locally authenticated attacker could exploit this vulnerability by running a specially crafted application. The security update addresses the vulnerability by helping to ensure that the Windows Kernel API properly handles objects in memory.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Windows 缓冲区错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft Windows Kernel是美国微软(Microsoft)公司的Windows操作系统的内核。 Microsoft Windows Kernel API 存在缓冲区错误漏洞,该漏洞源于Windows Kernel API不正确地处理了内存中的注册表对象。攻击者可通过运行特制的应用程序利用该漏洞获取提升的权限。以下产品及版本受到影响:Windows 10,Windows 10 1607版本,Windows 10 1709版本,Windows 10 1803版本,Windows 10 1
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
MicrosoftWindows 10 Version 1803 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*
MicrosoftWindows 10 Version 1809 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*
MicrosoftWindows Server 2019 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*
MicrosoftWindows Server 2019 (Server Core installation) 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*
MicrosoftWindows 10 Version 1909 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*
MicrosoftWindows Server, version 1909 (Server Core installation) 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*
MicrosoftWindows 10 Version 1709 for 32-bit Systems 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*
MicrosoftWindows 10 Version 1709 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*
MicrosoftWindows 10 Version 1903 for 32-bit Systems 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*
MicrosoftWindows 10 Version 1903 for x64-based Systems 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*
MicrosoftWindows 10 Version 1903 for ARM64-based Systems 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*
MicrosoftWindows Server, version 1903 (Server Core installation) 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*
MicrosoftWindows 10 Version 2004 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*
MicrosoftWindows Server version 2004 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*
MicrosoftWindows 10 Version 1507 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*
MicrosoftWindows 10 Version 1607 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*
MicrosoftWindows Server 2016 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
MicrosoftWindows Server 2016 (Server Core installation) 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
MicrosoftWindows 7 6.1.0 ~ publication cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*
MicrosoftWindows 7 Service Pack 1 6.1.0 ~ publication cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*
MicrosoftWindows 8.1 6.3.0 ~ publication cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*
MicrosoftWindows Server 2008 Service Pack 2 6.0.0 ~ publication cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*
MicrosoftWindows Server 2008 Service Pack 2 (Server Core installation) 6.0.0 ~ publication cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*
MicrosoftWindows Server 2008 Service Pack 2 6.0.0 ~ publication cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*
MicrosoftWindows Server 2008 R2 Service Pack 1 6.1.0 ~ publication cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*
MicrosoftWindows Server 2008 R2 Service Pack 1 (Server Core installation) 6.0.0 ~ publication cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*
MicrosoftWindows Server 2012 6.2.0 ~ publication cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*
MicrosoftWindows Server 2012 (Server Core installation) 6.2.0 ~ publication cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*
MicrosoftWindows Server 2012 R2 6.3.0 ~ publication cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*
MicrosoftWindows Server 2012 R2 (Server Core installation) 6.3.0 ~ publication cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*

II. Public POCs for CVE-2020-1378

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-1378

登录查看更多情报信息。

Same Patch Batch · Microsoft · 2020-08-17 · 121 CVEs total

CVE-2020-146710.0 CRITICALWindows Hard Link Elevation of Privilege Vulnerability
CVE-2020-15838.8 HIGHMicrosoft Word Information Disclosure Vulnerability
CVE-2020-15048.8 HIGHMicrosoft Excel Remote Code Execution Vulnerability
CVE-2020-15528.0 HIGHWindows Work Folder Service Elevation of Privilege Vulnerability
CVE-2020-15217.8 HIGHWindows Speech Runtime Elevation of Privilege Vulnerability
CVE-2020-15347.8 HIGHWindows Backup Service Elevation of Privilege Vulnerability
CVE-2020-15337.8 HIGHWindows WalletService Elevation of Privilege Vulnerability
CVE-2020-15317.8 HIGHWindows Accounts Control Elevation of Privilege Vulnerability
CVE-2020-15307.8 HIGHWindows Remote Access Elevation of Privilege Vulnerability
CVE-2020-15297.8 HIGHWindows GDI Elevation of Privilege Vulnerability
CVE-2020-15287.8 HIGHWindows Radio Manager API Elevation of Privilege Vulnerability
CVE-2020-15277.8 HIGHWindows Custom Protocol Engine Elevation of Privilege Vulnerability
CVE-2020-15267.8 HIGHWindows Network Connection Broker Elevation of Privilege Vulnerability
CVE-2020-15257.8 HIGHMedia Foundation Memory Corruption Vulnerability
CVE-2020-15247.8 HIGHWindows Speech Shell Components Elevation of Privilege Vulnerability
CVE-2020-15137.8 HIGHWindows CSC Service Elevation of Privilege Vulnerability
CVE-2020-15167.8 HIGHWindows Work Folders Service Elevation of Privilege Vulnerability
CVE-2020-15157.8 HIGHWindows Telephony Server Elevation of Privilege Vulnerability
CVE-2020-15177.8 HIGHWindows File Server Resource Management Service Elevation of Privilege Vulnerability
CVE-2020-15127.8 HIGHWindows State Repository Service Information Disclosure Vulnerability

Showing top 20 of 121 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2020-1378

No comments yet


Leave a comment