#VU28018 Untrusted Pointer Dereference in Windows and Windows Server


| Updated: 2022-02-20

Vulnerability identifier: #VU28018

Vulnerability risk: Low

CVSSv3.1: 6.7 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C]

CVE-ID: CVE-2020-0986

CWE-ID: CWE-822

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Windows
Operating systems & Components / Operating system
Windows Server
Operating systems & Components / Operating system

Vendor: Microsoft

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to untrusted pointer dereference within the user-mode printer driver host process splwow64.exe within the Windows kernel. A local user can run a specially crafted program to trigger untrusted pointer dereference and execute arbitrary code on the system with elevated privileges in the context of the current user at medium integrity level.

Successful exploitation of the vulnerability requires that attacker has the ability to execute low-privileged code on the target system.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Windows: 8.1 RT - 8.1, 10 1607 10.0.14393.10, 10 1709 10.0.16299.19, 10 1803 10.0.17134.48, 10 1809 10.0.17763.1, 10 1903 10.0.18362.116, 10 1909 10.0.18363.476, 10 2004 10.0.19041.264, 10

Windows Server: 2012 R2 - 2012, 2016 10.0.14393.10, 2019 10.0.17763.1 - 2019 2004


External links
http://www.zerodayinitiative.com/advisories/ZDI-20-663/
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0986


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.


Latest bulletins with this vulnerability