CVE-2020-1365High
MSR
MSR
Microsoft Security Response Center
The Security Update Guide is the source of truth for vulnerabilities in Microsoft products — KB article numbers, impacted builds and replacement patches. MSRC also assigns the MSRC-specific exploitability index used alongside CVSS.
Region
US
Updates
Patch Tuesday + ad-hoc
License
Proprietary
Microsoft's Security Update Guide, covering Windows, Office, Azure, SQL Server, Exchange and other first-party products.
https://msrc.microsoft.com/update-guide →Share link
Anyone with the link can open this vulnerability.
An elevation of privilege vulnerability exists when the Windows Event Logging Service improperly handles memory.To exploit this vulnerabi…
CVSS
7.8
High
EPSS
0.01
p68
Published
2020-01-01
Updated
2020-01-01
Description
An elevation of privilege vulnerability exists when the Windows Event Logging Service improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Event Logging Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1371.
Affected products
Windows_10Windows_7Windows_8.1Windows_rt_8.1Windows_server_2008Windows_server_2012Windows_server_2016Windows_server_2019
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Timeline
2020-01-01
Published
2020-01-01
Updated
CVSS 3.1 breakdown
Attack Vector
AV: L
Local (L)
Attack Complexity
AC: L
Low (L)
Privileges Required
PR: L
Low (L)
User Interaction
UI: N
None (N)
Scope
S: U
Unchanged (U)
Confidentiality Impact
C: H
High (H)
Integrity Impact
I: H
High (H)
Availability Impact
A: H
High (H)
Exploit indicators
EPSS
0.006 · p68
Known exploited (KEV)
No
Known exploits — Сканер-ВС
No Сканер-ВС checks registered for this vulnerability yet.
Affected software
| Product | Vendor | Status |
|---|---|---|
| windows_10 | * | Tracked |
| windows_7 | * | Tracked |
| windows_8.1 | * | Tracked |
| windows_rt_8.1 | * | Tracked |
| windows_server_2008 | * | Tracked |
| windows_server_2012 | * | Tracked |
| windows_server_2016 | * | Tracked |
| windows_server_2019 | * | Tracked |
| Windows | Microsoft | Tracked |
| Windows | Microsoft | Tracked |
| Windows | Microsoft | Tracked |
| Windows | Microsoft | Tracked |
| Windows | Microsoft | Tracked |
| Windows | Microsoft | Tracked |
| Windows | Microsoft | Tracked |
| Windows | Microsoft | Tracked |
| Windows | Microsoft | Tracked |
| Windows | Microsoft | Tracked |
| Windows | Microsoft | Tracked |
| Windows | Microsoft | Tracked |
Source databases
MSR
MSR
Microsoft Security Response Center
The Security Update Guide is the source of truth for vulnerabilities in Microsoft products — KB article numbers, impacted builds and replacement patches. MSRC also assigns the MSRC-specific exploitability index used alongside CVSS.
Region
US
Updates
Patch Tuesday + ad-hoc
License
Proprietary
Microsoft's Security Update Guide, covering Windows, Office, Azure, SQL Server, Exchange and other first-party products.
https://msrc.microsoft.com/update-guide →CVE
CVE
National Vulnerability Database
NVD is the U.S. government repository of standards-based vulnerability management data, built on top of the MITRE CVE list. Every record includes CPE applicability statements, CVSS v2 and v3.x base scores, CWE mappings and cross-references to advisories.
Region
US
Updates
15 min
License
Public Domain
Comprehensive catalog of publicly disclosed vulnerabilities with CPE matches, CVSS scoring and reference URLs. De-facto standard for cross-vendor correlation.
https://nvd.nist.gov →Related vulnerabilities