Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2020-1155 : What You Need to Know

Learn about CVE-2020-1155, an elevation of privilege flaw in Windows Runtime, allowing unauthorized access to affected systems. Find out mitigation steps and system versions impacted.

An elevation of privilege vulnerability in Windows Runtime allows attackers to improperly handle objects in memory, posing a risk to affected systems.

Understanding CVE-2020-1155

What is CVE-2020-1155?

This vulnerability arises from the mishandling of objects in memory within the Windows Runtime, known as 'Windows Runtime Elevation of Privilege Vulnerability'.

The Impact of CVE-2020-1155

This vulnerability's exploitation could lead to an elevation of privilege, potentially allowing unauthorized actions on the targeted system.

Technical Details of CVE-2020-1155

Vulnerability Description

        Type: Elevation of Privilege
        Risk: High
        Attack Vector: Local

Affected Systems and Versions

The following products and versions by Microsoft are known to be impacted:

        Windows 10 Version 1803 for 32-bit, x64-based, and ARM64-based Systems
        Windows 10 Version 1809 for 32-bit, x64-based, and ARM64-based Systems
        Windows 10 Version 1709 for 32-bit, x64-based, and ARM64-based Systems
        Windows Server versions 1803, 2019, and 2019 (Core installation)

Exploitation Mechanism

Attackers can exploit this flaw through local access to target systems, manipulating objects in memory to gain elevated privileges.

Mitigation and Prevention

Immediate Steps to Take

        Apply security patches from Microsoft promptly
        Implement the principle of least privilege to restrict access
        Monitor system logs for unusual activities

Long-Term Security Practices

        Conduct regular security assessments and audits
        Educate users on safe computing practices

Patching and Updates

Keep systems up to date with the latest security updates and patches released by Microsoft.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now