Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2020-17099

Опубликовано: 08 дек. 2020
Источник: msrc
CVSS3: 6.8
EPSS Низкий

Описание

Windows Lock Screen Security Feature Bypass Vulnerability

FAQ

How could an attacker exploit this vulnerability?

An authenticated user would need to lock their active session. An attacker with physical access could then perform actions that would allow them to execute code from the Windows lock screen in the context of the active user session.

NOTE: This can only be exploited if a user has already logged in and locked their session.

Обновления

ПродуктСтатьяОбновление
Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows Server 2016
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows Server 2016 (Server Core installation)
Windows 10 Version 1803 for 32-bit Systems
Windows 10 Version 1803 for x64-based Systems
Windows 10 Version 1803 for ARM64-based Systems
Windows 10 Version 1809 for 32-bit Systems

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

Older Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 68%
0.00573
Низкий

6.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.8
nvd
больше 4 лет назад

Windows Lock Screen Security Feature Bypass Vulnerability

CVSS3: 6.8
github
около 3 лет назад

, aka 'Windows Lock Screen Security Feature Bypass Vulnerability'.

CVSS3: 6.8
fstec
больше 4 лет назад

Уязвимость операционной системы Windows, связанная с ошибками в коде, позволяющая нарушителю обойти функции безопасности экрана блокировки Windows

EPSS

Процентиль: 68%
0.00573
Низкий

6.8 Medium

CVSS3