Rapid7 Vulnerability & Exploit Database

Microsoft Windows: CVE-2020-1012: WinINet API Elevation of Privilege Vulnerability

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Microsoft Windows: CVE-2020-1012: WinINet API Elevation of Privilege Vulnerability

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
09/08/2020
Created
09/09/2020
Added
09/08/2020
Modified
06/10/2024

Description

An elevation of privilege vulnerability exists in the way that the Wininit.dll handles objects in memory, aka 'WinINet API Elevation of Privilege Vulnerability'.

Solution(s)

  • microsoft-windows-windows_10-1507-kb4577049
  • microsoft-windows-windows_10-1607-kb4577015
  • microsoft-windows-windows_10-1709-kb4577041
  • microsoft-windows-windows_10-1803-kb4577032
  • microsoft-windows-windows_10-1809-kb4570333
  • microsoft-windows-windows_10-1903-kb4574727
  • microsoft-windows-windows_10-1909-kb4574727
  • microsoft-windows-windows_10-2004-kb4571756
  • msft-kb4570333-0e3dc4b3-4757-43e3-a5d4-bf64c1856363
  • msft-kb4571756-5b919d47-fce4-48a0-8d72-b3fc27b78f6e
  • msft-kb4574727-0eef97a6-edd8-47e9-b6c7-d2f66afcc6a1
  • msft-kb4574727-48c91ab8-33a2-4dc3-96b2-9d75dc6c1f78
  • msft-kb4577010-079a1898-8b38-40da-b9fb-792798d2048f
  • msft-kb4577010-09a7b67d-4fe3-43f0-826f-c97c4b56492f
  • msft-kb4577010-1c763886-d698-45d9-8e28-ea82a0e90c22
  • msft-kb4577010-33281192-3186-4bd3-99d6-cb359f335e88
  • msft-kb4577010-46b7f39a-1026-43db-b5b0-f56b67e27647
  • msft-kb4577010-647aa1d1-b624-40a3-a34e-ad42fcfe1a36
  • msft-kb4577010-7cdd5b5c-943e-4a44-af90-419b1607010f
  • msft-kb4577010-914577aa-4533-460e-abd4-fae26682e968
  • msft-kb4577010-9249de48-934b-46e6-871b-8afa2722d33e
  • msft-kb4577010-b23221c3-4223-4612-94b7-22779de63d2c
  • msft-kb4577010-b32554a4-0414-44dd-941e-4ee59dbd2da6
  • msft-kb4577010-b988c5c7-70ab-4a76-baa4-e9008b1d763d
  • msft-kb4577010-ea027fe6-c7bc-4fb8-b6ad-e45cb29ccf36
  • msft-kb4577015-6fa76bfe-50a8-4387-beba-0ab551736216

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;