Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2020-1267 : Vulnerability Insights and Analysis

Learn about CVE-2020-1267, a denial of service vulnerability in the Local Security Authority Subsystem Service (LSASS) on various Windows systems. Find out about affected versions and mitigation steps.

This security update corrects a denial of service in the Local Security Authority Subsystem Service (LSASS) caused by a specially crafted authentication request.

Understanding CVE-2020-1267

This CVE addresses a denial of service vulnerability in the LSASS service.

What is CVE-2020-1267?

A denial of service vulnerability in LSASS is triggered by a crafted authentication request.

The Impact of CVE-2020-1267

The vulnerability can be exploited by an authenticated attacker, leading to a denial of service condition on affected systems.

Technical Details of CVE-2020-1267

This section covers the technical aspects of the CVE.

Vulnerability Description

        Type: Denial of Service
        Name: Local Security Authority Subsystem Service Denial of Service Vulnerability

Affected Systems and Versions

The following systems and versions are affected:

        Windows 10 Version 2004
        Windows 10 Version 1803, 1809, 1709, 1607
        Windows 7, 8.1, RT 8.1
        Windows Server 2019, 2016, 2012, 2008 R2
        Windows Server 2008

Exploitation Mechanism

The vulnerability is exploited when an authenticated attacker sends a specifically crafted authentication request to the LSASS service.

Mitigation and Prevention

Steps to address and prevent exploitation of CVE-2020-1267.

Immediate Steps to Take

        Apply the security update provided by Microsoft.
        Monitor for any unusual LSASS service behavior.

Long-Term Security Practices

        Regularly update and patch all Windows systems.
        Implement a robust authentication mechanism on the network.

Patching and Updates

Microsoft has released a security update to fix the vulnerability in LSASS service.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now