Security News > 2020 > November > Google discloses actively exploited Windows zero-day (CVE-2020-17087)

Google discloses actively exploited Windows zero-day (CVE-2020-17087)
2020-11-02 10:48

Google researchers have made public a Windows kernel zero day vulnerability that is being exploited in the wild in tandem with a Google Chrome flaw that has been patched on October 20.

CVE-2020-17087 is a vulnerability in the Windows Kernel Cryptography Driver, and "Constitutes a locally accessible attack surface that can be exploited for privilege escalation."

The researchers have also included PoC exploit code, which has been tested on Windows 10 1903, but they noted that the affected driver "Looks to have been present since at least Windows 7," meaning that all the other supported Windows versions are probably vulnerable.

A patch for the issue is expected to be released on November 10, as part of the monthly Patch Tuesday effort by Microsoft.

According to a Microsoft spokesperson, exploitation of the flaw has only been spotted in conjuction with the Chrome vulnerability, which has been patched in Chrome and other Chromium-based browsers (e.g., Opera on October 21, Microsoft Edge on October 22.


News URL

http://feedproxy.google.com/~r/HelpNetSecurity/~3/yJdNRN2jBNg/

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2020-11-11 CVE-2020-17087 Incorrect Calculation of Buffer Size vulnerability in Microsoft products
Windows Kernel Local Elevation of Privilege Vulnerability
0.0

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Google 102 253 4223 4523 728 9727