Rapid7 Vulnerability & Exploit Database

Microsoft Windows: CVE-2020-1351: Microsoft Graphics Component Information Disclosure Vulnerability

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Microsoft Windows: CVE-2020-1351: Microsoft Graphics Component Information Disclosure Vulnerability

Severity
2
CVSS
(AV:L/AC:L/Au:N/C:P/I:N/A:N)
Published
07/14/2020
Created
07/15/2020
Added
07/14/2020
Modified
06/10/2024

Description

An information disclosure vulnerability exists when the Windows Graphics component improperly handles objects in memory, aka 'Microsoft Graphics Component Information Disclosure Vulnerability'.

Solution(s)

  • microsoft-windows-windows_10-1507-kb4565513
  • microsoft-windows-windows_10-1607-kb4565511
  • microsoft-windows-windows_10-1709-kb4565508
  • microsoft-windows-windows_10-1803-kb4565489
  • microsoft-windows-windows_10-1809-kb4558998
  • microsoft-windows-windows_10-1903-kb4565483
  • microsoft-windows-windows_10-1909-kb4565483
  • microsoft-windows-windows_10-2004-kb4565503
  • msft-kb4558998-2ea0212a-a53c-4d0c-a139-eb30c18cddca
  • msft-kb4565483-3953c76a-16d0-4028-977a-0a5108a8c373
  • msft-kb4565483-b3f51921-6afd-4c38-8092-51c1be956806
  • msft-kb4565503-9f4ad806-f4a9-4868-b9a2-900b0a123d96
  • msft-kb4565511-c59cd6f3-fff6-4368-9321-3a1275583276
  • msft-kb4565535-111aa627-8dcf-4b02-80bf-d9c15c7c6d15
  • msft-kb4565535-d9dde094-c8da-4c41-93bf-de9b0b58c9a1
  • msft-kb4565535-f965746a-43c8-4b7d-a0f1-d663818deda3
  • msft-kb4565539-029704b3-c051-4cf0-968c-2eeed32d0a5c
  • msft-kb4565539-07bff0f1-4e8e-4e22-991b-3c5089af193a
  • msft-kb4565539-2511b07e-3588-4bc8-9f9f-63e3c01c925b
  • msft-kb4565539-73777a31-4b9e-42fe-8876-2df56509d376
  • msft-kb4565539-fdb6011b-60c8-45b7-bbf7-66b5ca63b6de
  • msft-kb4565540-16d7b82b-31ae-4b66-82b4-10ecf2a2980d
  • msft-kb4565540-24c2efc2-a29c-4c0e-aa31-ec00d74ffdca
  • msft-kb4565540-84942b6a-22e3-45d8-952e-3476d7483b60

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;