Rapid7 Vulnerability & Exploit Database

Microsoft Windows: CVE-2020-1054: Win32k Elevation of Privilege Vulnerability

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Microsoft Windows: CVE-2020-1054: Win32k Elevation of Privilege Vulnerability

Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
05/12/2020
Created
05/13/2020
Added
06/09/2020
Modified
09/11/2024

Description

An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1143.

Solution(s)

  • microsoft-windows-windows_10-1507-kb4556826
  • microsoft-windows-windows_10-1607-kb4556813
  • microsoft-windows-windows_10-1709-kb4556812
  • microsoft-windows-windows_10-1803-kb4556807
  • microsoft-windows-windows_10-1809-kb4551853
  • microsoft-windows-windows_10-1903-kb4556799
  • microsoft-windows-windows_10-1909-kb4556799
  • microsoft-windows-windows_server_2012-kb4556852
  • microsoft-windows-windows_server_2012_r2-kb4556853
  • microsoft-windows-windows_server_2016-1607-kb4556813
  • microsoft-windows-windows_server_2019-1809-kb4551853
  • msft-kb4556799-2e69bf96-184c-46b9-8937-306e23bdb930
  • msft-kb4556799-7f570c23-239e-430c-b403-391861eae9a3
  • msft-kb4556843-18ba7a1f-f3d5-4939-83fa-64f96dd1eeef
  • msft-kb4556843-9814f135-936f-4ad1-aed5-17b04b171ad3
  • msft-kb4556843-a42409fa-d080-4ad0-87a2-e8f2720c3106
  • msft-kb4556843-f8a7bc32-9e4e-487d-84fa-6a54b2bf9b18
  • msft-kb4556843-f9c55547-ccbd-43a7-879f-ba43e8f87a26
  • msft-kb4556852-b1ad1cae-3e60-45f4-807e-20d602effdc7
  • msft-kb4556852-db559421-c2a0-4db9-8f01-d0095d20dd9f
  • msft-kb4556853-e37bb647-80a1-4ec3-8908-fbe83547cafe
  • msft-kb4556853-fed44027-6e0b-43e8-a358-788e4b27879f
  • msft-kb4556854-66f02eb5-75fc-44ac-abbd-33c423b2eb72
  • msft-kb4556854-ee5e91bb-be4b-4cde-af59-81477f953897

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;