Rapid7 Vulnerability & Exploit Database

Microsoft CVE-2020-16960: Windows Backup Engine Elevation of Privilege Vulnerability

Back to Search

Microsoft CVE-2020-16960: Windows Backup Engine Elevation of Privilege Vulnerability

Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
12/08/2020
Created
12/09/2020
Added
12/08/2020
Modified
11/18/2021

Description

Microsoft CVE-2020-16960: Windows Backup Engine Elevation of Privilege Vulnerability

Solution(s)

  • msft-kb4592438-15977794-6659-4a77-8697-52dc35b9ee4d
  • msft-kb4592438-16d8a1cd-0917-4a95-87f1-c5545a2a3b78
  • msft-kb4592438-31f82d18-274a-4670-aa6e-19c0f7b6e4e9
  • msft-kb4592438-83ed9a8d-de9e-4765-af20-b9aff16b15c9
  • msft-kb4592438-8eb773b8-808c-4a1d-ae06-fd4de59378fb
  • msft-kb4592438-bea9c74f-f170-47af-be4a-e6d2750c6a16
  • msft-kb4592440-a6cf10ba-58ac-499f-a935-91962821fe51
  • msft-kb4592440-b8c3207f-4469-46b3-9a0f-b4057b54add3
  • msft-kb4592440-f74de6fe-0291-4db2-9008-1d63271dbd16
  • msft-kb4592446-e654bcbd-5662-4aa8-8116-e922a7373832
  • msft-kb4592446-e7f9f2b6-3c08-4795-b97a-503e1cc55c3c
  • msft-kb4592449-05f40647-3815-465b-8f23-977beb5f8143
  • msft-kb4592449-639cae64-91b2-444e-9810-50ef1637c7e2
  • msft-kb4592449-80ec969b-d66f-44ff-a44f-3e818e9574f1
  • msft-kb4592449-89f5e290-883b-4eda-a95f-5193ef3e6125
  • msft-kb4592449-94baa2c6-ab88-4da3-bfd9-f69a45269dd4
  • msft-kb4592449-f85d10fe-31c6-4f31-a10d-cd912341b379
  • msft-kb4592464-28f3868e-7ab5-4fc3-bd3b-c1025eec5528
  • msft-kb4592464-32470836-db0f-4619-ba4e-23136b534216
  • msft-kb4592503-122e6a25-df5f-4ca0-846b-e0e9d8f6c960
  • msft-kb4592503-386c25c6-618e-49d0-901b-7872f0ffacc9
  • msft-kb4592503-6ea99f57-37b5-42c3-ad56-72e38ece5205
  • msft-kb4592503-e6e88251-3474-4591-9402-0d207236b562
  • msft-kb4592503-f5b8657c-bd34-43c1-a30a-e225eeeb340c
  • msft-kb4593226-67eab6a6-099b-42c5-86ce-63681f58ebd2
  • msft-kb4593226-c7ae09ef-d592-44c8-a2c1-aca18597de03
  • msft-kb4593226-e1e5bcdd-4e8e-4235-a8aa-e4379460d650

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;