<p>An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.</p>
<p>To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.</p>
<p>The security update addresses the vulnerability by ensuring the Windows Network Connections Service properly handles objects in memory.</p>
                
            References
                    | Link | Resource | 
|---|---|
| https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16887 | Patch Vendor Advisory | 
| https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16887 | Patch Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    No history.
Information
                Published : 2020-10-16 23:15
Updated : 2024-11-21 05:07
NVD link : CVE-2020-16887
Mitre link : CVE-2020-16887
CVE.ORG link : CVE-2020-16887
JSON object : View
Products Affected
                microsoft
- windows_server_2016
- windows_rt_8.1
- windows_10
- windows_8.1
- windows_server_2012
- windows_7
- windows_server_2019
- windows_server_2008
CWE
                