Lucene search

K
cve[email protected]CVE-2020-0762
HistoryMar 12, 2020 - 4:15 p.m.

CVE-2020-0762

2020-03-1216:15:13
web.nvd.nist.gov
63
cve-2020-0762
windows defender
elevation of privilege
nvd

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.5 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.5%

An elevation of privilege vulnerability exists when Windows Defender Security Center handles certain objects in memory.To exploit the vulnerability, an attacker would first have to log on to the system, aka ‘Windows Defender Security Center Elevation of Privilege Vulnerability’. This CVE ID is unique from CVE-2020-0763.

Affected configurations

Vulners
NVD
Node
microsoftwindows_server,_version_1903Matchunspecified
OR
microsoftwindows_10_1909 for arm64-based systemsMatchunspecified
OR
microsoftwindows_10_1909 for 32-bit systemsMatchunspecified
OR
microsoftwindows_server,_version_1909Matchunspecified
OR
microsoftwindows_10_1903 for 32-bit systemsMatchunspecified
OR
microsoftwindows_10_1903 for x64-based systemsMatchunspecified
OR
microsoftwindows_10_1903 for arm64-based systemsMatchunspecified
OR
microsoftwindows_10_1909 for x64-based systemsMatchunspecified
OR
microsoftwindows
OR
microsoftwindows
OR
microsoftwindows
OR
microsoftwindows
OR
microsoftwindows
OR
microsoftwindows
OR
microsoftwindows
OR
microsoftwindows
OR
microsoftwindows
OR
microsoftwindows_server
VendorProductVersionCPE
microsoftwindows_server,_version_1903unspecifiedcpe:2.3:o:microsoft:windows_server,_version_1903:unspecified:*:*:*:*:*:*:*
microsoftwindows_10_1909 for arm64-based systemsunspecifiedcpe:2.3:o:microsoft:windows_10_1909 for arm64-based systems:unspecified:*:*:*:*:*:*:*
microsoftwindows_10_1909 for 32-bit systemsunspecifiedcpe:2.3:o:microsoft:windows_10_1909 for 32-bit systems:unspecified:*:*:*:*:*:*:*
microsoftwindows_server,_version_1909unspecifiedcpe:2.3:o:microsoft:windows_server,_version_1909:unspecified:*:*:*:*:*:*:*
microsoftwindows_10_1903 for 32-bit systemsunspecifiedcpe:2.3:o:microsoft:windows_10_1903 for 32-bit systems:unspecified:*:*:*:*:*:*:*
microsoftwindows_10_1903 for x64-based systemsunspecifiedcpe:2.3:o:microsoft:windows_10_1903 for x64-based systems:unspecified:*:*:*:*:*:*:*
microsoftwindows_10_1903 for arm64-based systemsunspecifiedcpe:2.3:o:microsoft:windows_10_1903 for arm64-based systems:unspecified:*:*:*:*:*:*:*
microsoftwindows_10_1909 for x64-based systemsunspecifiedcpe:2.3:o:microsoft:windows_10_1909 for x64-based systems:unspecified:*:*:*:*:*:*:*
microsoftwindows*cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
microsoftwindows*cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
Rows per page:
1-10 of 181

CNA Affected

[
  {
    "product": "Windows Server, version 1903 (Server Core installation)",
    "vendor": "Microsoft",
    "versions": [
      {
        "status": "affected",
        "version": "unspecified"
      }
    ]
  },
  {
    "product": "Windows 10 Version 1909 for ARM64-based Systems",
    "vendor": "Microsoft",
    "versions": [
      {
        "status": "affected",
        "version": "unspecified"
      }
    ]
  },
  {
    "product": "Windows 10 Version 1909 for 32-bit Systems",
    "vendor": "Microsoft",
    "versions": [
      {
        "status": "affected",
        "version": "unspecified"
      }
    ]
  },
  {
    "product": "Windows Server, version 1909 (Server Core installation)",
    "vendor": "Microsoft",
    "versions": [
      {
        "status": "affected",
        "version": "unspecified"
      }
    ]
  },
  {
    "product": "Windows 10 Version 1903 for 32-bit Systems",
    "vendor": "Microsoft",
    "versions": [
      {
        "status": "affected",
        "version": "unspecified"
      }
    ]
  },
  {
    "product": "Windows 10 Version 1903 for x64-based Systems",
    "vendor": "Microsoft",
    "versions": [
      {
        "status": "affected",
        "version": "unspecified"
      }
    ]
  },
  {
    "product": "Windows 10 Version 1903 for ARM64-based Systems",
    "vendor": "Microsoft",
    "versions": [
      {
        "status": "affected",
        "version": "unspecified"
      }
    ]
  },
  {
    "product": "Windows 10 Version 1909 for x64-based Systems",
    "vendor": "Microsoft",
    "versions": [
      {
        "status": "affected",
        "version": "unspecified"
      }
    ]
  },
  {
    "product": "Windows",
    "vendor": "Microsoft",
    "versions": [
      {
        "status": "affected",
        "version": "10 Version 1803 for x64-based Systems"
      },
      {
        "status": "affected",
        "version": "10 Version 1803 for 32-bit Systems"
      },
      {
        "status": "affected",
        "version": "10 Version 1709 for 32-bit Systems"
      },
      {
        "status": "affected",
        "version": "10 Version 1809 for ARM64-based Systems"
      },
      {
        "status": "affected",
        "version": "10 Version 1803 for ARM64-based Systems"
      },
      {
        "status": "affected",
        "version": "10 Version 1809 for x64-based Systems"
      },
      {
        "status": "affected",
        "version": "10 Version 1709 for ARM64-based Systems"
      },
      {
        "status": "affected",
        "version": "10 Version 1809 for 32-bit Systems"
      },
      {
        "status": "affected",
        "version": "10 Version 1709 for x64-based Systems"
      }
    ]
  },
  {
    "product": "Windows Server",
    "vendor": "Microsoft",
    "versions": [
      {
        "status": "affected",
        "version": "version 1803  (Core Installation)"
      }
    ]
  }
]

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.5 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.5%