A security feature bypass vulnerability exists when Windows Kernel fails to properly sanitize certain parameters.To exploit the vulnerability, a locally-authenticated attacker could attempt to run a specially crafted application on a targeted system.The update addresses the vulnerability by correcting how Windows Kernel handles parameter sanitization., aka 'Windows Kernel Security Feature Bypass Vulnerability'.
2020-06-09T20:15:16.177
2024-11-21T05:10:03.537
Modified
CVSSv3.1: 7.8 (HIGH)
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.6
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | microsoft | windows_10 | 1607 | Yes |
Operating System | microsoft | windows_10 | 1709 | Yes |
Operating System | microsoft | windows_10 | 1803 | Yes |
Operating System | microsoft | windows_10 | 1809 | Yes |
Operating System | microsoft | windows_10 | 1903 | Yes |
Operating System | microsoft | windows_10 | 1909 | Yes |
Operating System | microsoft | windows_10 | 2004 | Yes |
Operating System | microsoft | windows_server_2016 | - | Yes |
Operating System | microsoft | windows_server_2016 | 1803 | Yes |
Operating System | microsoft | windows_server_2016 | 1903 | Yes |
Operating System | microsoft | windows_server_2016 | 1909 | Yes |
Operating System | microsoft | windows_server_2016 | 2004 | Yes |
Operating System | microsoft | windows_server_2019 | - | Yes |