CVE-2020-0792
vulnerability analysis and mitigation

Overview

CVE-2020-0792 is a Windows Graphics Component Elevation of Privilege Vulnerability that was disclosed on February 11, 2020. The vulnerability affects Microsoft Windows installations and allows local attackers to escalate privileges on affected systems. This vulnerability is distinct from related issues CVE-2020-0715 and CVE-2020-0745 (NVD).

Technical details

The vulnerability exists within the NtUserResolveDesktopForWOW function and stems from improper validation of user-supplied data length before copying it to a heap-based buffer, resulting in a heap-based buffer overflow condition. The vulnerability has received a CVSS v3.1 base score of 8.8 (HIGH) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H. The issue has been classified as CWE-787 (Out-of-bounds Write) (ZDI Advisory, NVD).

Impact

When successfully exploited, this vulnerability allows an attacker to execute code in the context of SYSTEM, effectively gaining elevated privileges on the affected system. The vulnerability requires the attacker to first obtain the ability to execute low-privileged code on the target system (ZDI Advisory).

Mitigation and workarounds

Microsoft has released a security update to address this vulnerability. Users are advised to apply the available patches through the official Microsoft security advisory (Microsoft Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management