vulnerability
Microsoft Windows: CVE-2020-0707: Windows IME Elevation of Privilege Vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | Feb 11, 2020 | Feb 11, 2020 | Sep 5, 2025 |
Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
Feb 11, 2020
Added
Feb 11, 2020
Modified
Sep 5, 2025
Description
An elevation of privilege vulnerability exists when the Windows IME improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows IME Elevation of Privilege Vulnerability'.
Solutions
microsoft-windows-windows_10-1507-kb4537776microsoft-windows-windows_10-1607-kb4537764microsoft-windows-windows_10-1709-kb4537789microsoft-windows-windows_10-1803-kb4537762microsoft-windows-windows_10-1809-kb4532691microsoft-windows-windows_10-1903-kb4532693microsoft-windows-windows_10-1909-kb4532693microsoft-windows-windows_server_2012-kb4537794microsoft-windows-windows_server_2012_r2-kb4537803microsoft-windows-windows_server_2016-1607-kb4537764microsoft-windows-windows_server_2019-1809-kb4532691msft-kb4532693-a9b1a21b-4d78-4445-a122-0920a6bed52amsft-kb4532693-bb723d9d-43f9-41c3-ac36-25a6146ee6e3msft-kb4537794-568a5fd6-48c6-43f9-9ba0-2623e21003a0msft-kb4537794-8ae8ed3e-0077-405b-8f55-4f7c6a13238cmsft-kb4537803-14ae1eab-47ad-4f74-82ee-b2f75e6a258emsft-kb4537803-abdc886d-fd3f-4006-9344-8497d4e85cbd
References
- CVE-2020-0707
- https://attackerkb.com/topics/CVE-2020-0707
- URL-https://support.microsoft.com/help/4532691
- URL-https://support.microsoft.com/help/4532693
- URL-https://support.microsoft.com/help/4537762
- URL-https://support.microsoft.com/help/4537764
- URL-https://support.microsoft.com/help/4537776
- URL-https://support.microsoft.com/help/4537789
- URL-https://support.microsoft.com/help/4537794
- URL-https://support.microsoft.com/help/4537803
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.