Rapid7 Vulnerability & Exploit Database

Microsoft CVE-2020-1463: Windows SharedStream Library Elevation of Privilege Vulnerability

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Microsoft CVE-2020-1463: Windows SharedStream Library Elevation of Privilege Vulnerability

Severity
5
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Published
07/14/2020
Created
07/15/2020
Added
07/14/2020
Modified
11/18/2021

Description

An elevation of privilege vulnerability exists in the way that the SharedStream Library handles objects in memory, aka 'Windows SharedStream Library Elevation of Privilege Vulnerability'.

Solution(s)

  • msft-kb4558998-2ea0212a-a53c-4d0c-a139-eb30c18cddca
  • msft-kb4558998-68af4d94-88ce-4036-a1c5-8f0d7c2a76cb
  • msft-kb4558998-e138232a-fc42-458a-b9c5-0825d3c32cbb
  • msft-kb4565483-1005a8f3-10da-48b0-86e1-adebe1fd5dd3
  • msft-kb4565483-389b25fc-ee6e-4387-9694-36cf3d6fba53
  • msft-kb4565483-3953c76a-16d0-4028-977a-0a5108a8c373
  • msft-kb4565483-3d9c274a-fec8-44c8-b2f5-10ba9359d556
  • msft-kb4565483-b0c5cbda-81c1-4b37-82c2-ffc7cff33c57
  • msft-kb4565483-b3f51921-6afd-4c38-8092-51c1be956806
  • msft-kb4565489-1d68cd90-971e-43f4-ab9e-626ae9429fc9
  • msft-kb4565489-72f35143-59a4-43d2-a23b-ec3cdbbf729d
  • msft-kb4565503-197596bc-0893-4b83-a165-eac8b3a0ca9f
  • msft-kb4565503-77d8f96b-d56a-4f77-b492-0cca5e877ed3
  • msft-kb4565503-9f4ad806-f4a9-4868-b9a2-900b0a123d96
  • msft-kb4565508-785b1349-3f0c-4bd5-9026-82852f0f9be3
  • msft-kb4565508-cbdd311f-9094-4a87-a5ce-8c10c46070be
  • msft-kb4565511-51c72e01-8b82-457e-b308-29975f3bb759
  • msft-kb4565511-72f5c720-ee6c-48ae-904b-ec5449b9a560
  • msft-kb4565511-c59cd6f3-fff6-4368-9321-3a1275583276

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;