Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2020-1085 : What You Need to Know

Learn about CVE-2020-1085, an elevation of privilege vulnerability in Windows Function Discovery Service. Find out impacted systems and best practices for mitigation.

An elevation of privilege vulnerability exists in the way that the Windows Function Discovery Service handles objects in memory, aka 'Windows Function Discovery Service Elevation of Privilege Vulnerability'.

Understanding CVE-2020-1085

This CVE identifies a specific vulnerability related to the handling of objects in memory by the Windows Function Discovery Service.

What is CVE-2020-1085?

The vulnerability in CVE-2020-1085 is classified as an elevation of privilege issue within the Windows Function Discovery Service.

The Impact of CVE-2020-1085

This vulnerability could allow an attacker to elevate their privileges on a Windows system, potentially leading to unauthorized access to sensitive information or the ability to execute malicious actions.

Technical Details of CVE-2020-1085

This section provides more technical insights into the CVE.

Vulnerability Description

The vulnerability is due to improper handling of objects in memory within the Windows Function Discovery Service.

Affected Systems and Versions

The following products by Microsoft are affected by CVE-2020-1085:

        Windows 10 Version 2004 for ARM64-based Systems
        Windows 10 Version 2004 for x64-based Systems
        Windows Server, version 2004 (Server Core installation)
        Various versions of Windows including 10, 8.1, 7, and more

Exploitation Mechanism

The exploitation of this vulnerability would involve manipulating objects in memory to gain elevated privileges on the affected Windows systems.

Mitigation and Prevention

Mitigation strategies and actions to prevent exploitation of CVE-2020-1085.

Immediate Steps to Take

        Apply security updates and patches provided by Microsoft promptly.
        Monitor system logs and user activities for any unusual behavior that may indicate exploitation.

Long-Term Security Practices

        Implement the principle of least privilege to limit user access rights.
        Regularly conduct security training for users to recognize and report suspicious activities.

Patching and Updates

Ensure that all affected systems are updated with the latest security patches and updates from Microsoft to remediate the vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now