An elevation of privilege vulnerability exists in the way that the srmsvc.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.
The security update addresses the vulnerability by ensuring the srmsvc.dll properly handles objects in memory.
References
Link | Resource |
---|---|
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1475 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2020-08-17 19:15
Updated : 2024-01-19 00:15
NVD link : CVE-2020-1475
Mitre link : CVE-2020-1475
CVE.ORG link : CVE-2020-1475
JSON object : View
Products Affected
microsoft
- windows_8.1
- windows_10
- windows_server_2012
- windows_rt_8.1
- windows_7
- windows_server_2019
- windows_server_2016
- windows_server_2008
CWE