CISA KEV 정보
| 취약점명 | Microsoft Windows Kernel Privilege Escalation Vulnerability |
|---|---|
| 설명 | An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. |
| 조치사항 | Apply updates per vendor instructions. |
| 랜섬웨어 캠페인 악용 | Unknown |
| CWE | CWE-787 |
| 등록일 (KEV) | 2022-05-23 |
| 조치 기한 | 2022-06-13 |
| 추가 참고 | https://nvd.nist.gov/vuln/detail/CVE-2020-1027 |
NVD 상세 정보
CVSS v3.1: 7.8 HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HCVSS v2.0: 7.2
AV:L/AC:L/Au:N/C:C/I:C/A:C설명: An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0913, CVE-2020-1000, CVE-2020-1003.
CWE: CWE-787 | CWE-787
참조
- http://packetstormsecurity.com/files/168068/Windows-sxs-CNodeFactory-XMLParser_Element_doc_assembly_assemblyIdentity-Heap-Buffer-Overflow.html [Exploit, Third Party Advisory, VDB Entry]
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1027 [Patch, Vendor Advisory]
- http://packetstormsecurity.com/files/168068/Windows-sxs-CNodeFactory-XMLParser_Element_doc_assembly_assemblyIdentity-Heap-Buffer-Overflow.html [Exploit, Third Party Advisory, VDB Entry]
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1027 [Patch, Vendor Advisory]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-1027 [US Government Resource]
This product uses the NVD API but is not endorsed or certified by the NVD.