An elevation of privilege vulnerability exists when Windows improperly handles hard links. An attacker who successfully exploited this vulnerability could overwrite a targeted file leading to an elevated status. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The security update addresses the vulnerability by correcting how Windows handles hard links.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Windows_10 | Microsoft | 1607 (including) | 1607 (including) |
Windows_10 | Microsoft | 1809 (including) | 1809 (including) |
Windows_10 | Microsoft | 1903 (including) | 1903 (including) |
Windows_10 | Microsoft | 1909 (including) | 1909 (including) |
Windows_10 | Microsoft | 2004 (including) | 2004 (including) |
Windows_7 | Microsoft | –sp1 (including) | –sp1 (including) |
Windows_8.1 | Microsoft | - (including) | - (including) |
Windows_rt_8.1 | Microsoft | - (including) | - (including) |
Windows_server_2008 | Microsoft | –sp2 (including) | –sp2 (including) |
Windows_server_2008 | Microsoft | r2-sp1 (including) | r2-sp1 (including) |
Windows_server_2012 | Microsoft | - (including) | - (including) |
Windows_server_2012 | Microsoft | r2 (including) | r2 (including) |
Windows_server_2016 | Microsoft | - (including) | - (including) |
Windows_server_2016 | Microsoft | 1903 (including) | 1903 (including) |
Windows_server_2016 | Microsoft | 1909 (including) | 1909 (including) |
Windows_server_2016 | Microsoft | 2004 (including) | 2004 (including) |
Windows_server_2019 | Microsoft | - (including) | - (including) |