| Vulnerability Name | Elevation of Privilege Vulnerability in Windows Kernel |
| Severity Rating | HIGH |
| Software Affected | Windows 10 for 32-bit and x64-based Systems Windows 10 Version 1607 for 32-bit Systems and x64-based Systems Windows 10 Version 1809 for 32-bit Systems, x64-based Systems and ARM64-based Systems Windows 10 Version 1903 for 32-bit Systems, x64-based Systems and ARM64-based Systems Windows 10 Version 1909 for 32-bit Systems, x64-based Systems and ARM64-based Systems Windows 10 Version 2004 for 32-bit Systems, x64-based Systems and ARM64-based Systems Windows 10 Version 20H2 for 32-bit Systems, x64-based Systems and ARM64-based Systems Windows 7 for 32-bit Systems SP1 and x64-based Systems SP1 Windows 8.1 for 32-bit systems and x64-based Systems Windows RT 8.1 Windows Server 2008 for 32-bit Systems SP2 and x64-based Systems SP2 Windows Server 2008 for 32-bit Systems SP2 (Server Core installation) Windows Server 2008 for x64-based Systems SP2 (Server Core installation) Windows Server 2008 R2 for x64-based Systems SP1 Windows Server 2008 R2 for x64-based Systems SP1 (Server Core installation) Windows Server 2012 Windows Server 2012 R2 Windows Server 2012 (Server Core installation) Windows Server 2012 R2 (Server Core installation) Windows Server 2016 Windows Server 2016 (Server Core installation) Windows Server 2019 Windows Server 2019 (Server Core installation) Windows Server, version 1903 (Server Core installation) Windows Server, version 1909 (Server Core installation) Windows Server, version 2004 (Server Core installation) Windows Server, version 20H2 (Server Core Installation) |
| CVE Name | CVE-2020-17087 |
Overview
A vulnerability has been reported in Microsoft Windows which could be exploited by an attacker to gain elevated privileges on a targeted system.
Description
This vulnerability exists in the Windows Kernel Cryptography Driver (cng.sys) due to a possible buffer overflow issue. Successful exploitation of this vulnerability could allow an attacker to gain elevated privileges on the targeted system.
Note: This vulnerability has been reported to have been exploited in wild in a targeted attack.
Solution
Apply appropriate patches as mentioned in Microsoft Security Guidance
https://portal.msrc.microsoft.com/en-us/security-guidance
Vendor Information
Microsoft
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17087
References
Tenable
https://www.tenable.com/blog/microsoft-s-november-2020-patch-tuesday-addresses-112-cves-including-cve-2020-17087
Google Project Zero
https://bugs.chromium.org/p/project-zero/issues/detail?id=2104
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Note: Any unusual activity or attack should be reported immediately at incident@cert-in.org.in, cert.ksitm@kerala.gov.in with the relevant logs for analysis and taking further appropriate actions.