vulnerability
Microsoft Windows: CVE-2020-1310: Win32k Elevation of Privilege Vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | Jun 9, 2020 | Jun 9, 2020 | Sep 5, 2025 |
Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
Jun 9, 2020
Added
Jun 9, 2020
Modified
Sep 5, 2025
Description
An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1207, CVE-2020-1247, CVE-2020-1251, CVE-2020-1253.
Solutions
microsoft-windows-windows_10-1507-kb4561649microsoft-windows-windows_10-1607-kb4561616microsoft-windows-windows_10-1709-kb4561602microsoft-windows-windows_10-1803-kb4561621microsoft-windows-windows_10-1809-kb4561608microsoft-windows-windows_10-1903-kb4560960microsoft-windows-windows_10-1909-kb4560960microsoft-windows-windows_server_2012-kb4561674microsoft-windows-windows_server_2012_r2-kb4561673microsoft-windows-windows_server_2016-1607-kb4561616microsoft-windows-windows_server_2019-1809-kb4561608msft-kb4560960-35eeaed4-c0c0-436f-a584-b58f31a89642msft-kb4560960-ad75f2bc-0622-4a84-a93d-bb94fe8cff13msft-kb4561673-2abed83b-4909-457d-a57c-1850ed986c83msft-kb4561673-912dce3d-0621-4c74-91fe-e7a5f370435bmsft-kb4561674-033891fc-1d72-47e7-9c01-566ae179b26bmsft-kb4561674-e8efd911-36d9-486a-8584-1630576ce0db
References
- CVE-2020-1310
- https://attackerkb.com/topics/CVE-2020-1310
- URL-https://support.microsoft.com/help/4560960
- URL-https://support.microsoft.com/help/4561602
- URL-https://support.microsoft.com/help/4561608
- URL-https://support.microsoft.com/help/4561616
- URL-https://support.microsoft.com/help/4561621
- URL-https://support.microsoft.com/help/4561649
- URL-https://support.microsoft.com/help/4561673
- URL-https://support.microsoft.com/help/4561674
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.