<p>An elevation of privilege vulnerability exists when Windows improperly handles COM object creation. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges.</p> <p>To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.</p> <p>The update addresses the vulnerability by correcting how the Windows COM Server creates COM objects.</p>
2020-10-16T23:15:15.460
2024-11-21T05:07:27.593
Modified
CVSSv3.1: 7.8 (HIGH)
AV:L/AC:L/Au:N/C:C/I:C/A:C
3.9
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | microsoft | windows_10 | - | Yes |
Operating System | microsoft | windows_10 | 1607 | Yes |
Operating System | microsoft | windows_10 | 1709 | Yes |
Operating System | microsoft | windows_10 | 1803 | Yes |
Operating System | microsoft | windows_10 | 1809 | Yes |
Operating System | microsoft | windows_10 | 1903 | Yes |
Operating System | microsoft | windows_10 | 1909 | Yes |
Operating System | microsoft | windows_10 | 2004 | Yes |
Operating System | microsoft | windows_7 | - | Yes |
Operating System | microsoft | windows_8.1 | - | Yes |
Operating System | microsoft | windows_rt_8.1 | - | Yes |
Operating System | microsoft | windows_server_2008 | - | Yes |
Operating System | microsoft | windows_server_2008 | r2 | Yes |
Operating System | microsoft | windows_server_2012 | - | Yes |
Operating System | microsoft | windows_server_2012 | r2 | Yes |
Operating System | microsoft | windows_server_2016 | - | Yes |
Operating System | microsoft | windows_server_2016 | 1903 | Yes |
Operating System | microsoft | windows_server_2016 | 1909 | Yes |
Operating System | microsoft | windows_server_2016 | 2004 | Yes |
Operating System | microsoft | windows_server_2019 | - | Yes |