{"containers":{"cna":{"affected":[{"product":"Windows","vendor":"Microsoft","versions":[{"status":"affected","version":"10 Version 1803 for 32-bit Systems"},{"status":"affected","version":"10 Version 1803 for x64-based Systems"},{"status":"affected","version":"10 Version 1803 for ARM64-based Systems"},{"status":"affected","version":"10 Version 1809 for 32-bit Systems"},{"status":"affected","version":"10 Version 1809 for x64-based Systems"},{"status":"affected","version":"10 Version 1809 for ARM64-based Systems"},{"status":"affected","version":"10 Version 1709 for 32-bit Systems"},{"status":"affected","version":"10 Version 1709 for x64-based Systems"},{"status":"affected","version":"10 Version 1709 for ARM64-based Systems"},{"status":"affected","version":"10 for 32-bit Systems"},{"status":"affected","version":"10 for x64-based Systems"},{"status":"affected","version":"10 Version 1607 for 32-bit Systems"},{"status":"affected","version":"10 Version 1607 for x64-based Systems"},{"status":"affected","version":"8.1 for 32-bit systems"},{"status":"affected","version":"8.1 for x64-based systems"},{"status":"affected","version":"RT 8.1"}]},{"product":"Windows Server","vendor":"Microsoft","versions":[{"status":"affected","version":"version 1803  (Core Installation)"},{"status":"affected","version":"2019"},{"status":"affected","version":"2019  (Core installation)"},{"status":"affected","version":"2016"},{"status":"affected","version":"2016  (Core installation)"},{"status":"affected","version":"2012"},{"status":"affected","version":"2012 (Core installation)"},{"status":"affected","version":"2012 R2"},{"status":"affected","version":"2012 R2 (Core installation)"}]},{"product":"Windows 10 Version 1909 for 32-bit Systems","vendor":"Microsoft","versions":[{"status":"affected","version":"unspecified"}]},{"product":"Windows 10 Version 1909 for x64-based Systems","vendor":"Microsoft","versions":[{"status":"affected","version":"unspecified"}]},{"product":"Windows 10 Version 1909 for ARM64-based Systems","vendor":"Microsoft","versions":[{"status":"affected","version":"unspecified"}]},{"product":"Windows Server, version 1909 (Server Core installation)","vendor":"Microsoft","versions":[{"status":"affected","version":"unspecified"}]},{"product":"Windows 10 Version 1903 for 32-bit Systems","vendor":"Microsoft","versions":[{"status":"affected","version":"unspecified"}]},{"product":"Windows 10 Version 1903 for x64-based Systems","vendor":"Microsoft","versions":[{"status":"affected","version":"unspecified"}]},{"product":"Windows 10 Version 1903 for ARM64-based Systems","vendor":"Microsoft","versions":[{"status":"affected","version":"unspecified"}]},{"product":"Windows Server, version 1903 (Server Core installation)","vendor":"Microsoft","versions":[{"status":"affected","version":"unspecified"}]},{"product":"Windows 10 Version 2004 for 32-bit Systems","vendor":"Microsoft","versions":[{"status":"affected","version":"unspecified"}]},{"product":"Windows Server, version 2004 (Server Core installation)","vendor":"Microsoft","versions":[{"status":"affected","version":"unspecified"}]},{"product":"Windows 10 Version 2004 for ARM64-based Systems","vendor":"Microsoft","versions":[{"status":"affected","version":"unspecified"}]},{"product":"Windows 10 Version 2004 for x64-based Systems","vendor":"Microsoft","versions":[{"status":"affected","version":"unspecified"}]}],"descriptions":[{"lang":"en","value":"An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1237, CVE-2020-1246, CVE-2020-1262, CVE-2020-1264, CVE-2020-1266, CVE-2020-1269, CVE-2020-1273, CVE-2020-1274, CVE-2020-1275, CVE-2020-1276, CVE-2020-1307, CVE-2020-1316."}],"problemTypes":[{"descriptions":[{"description":"Elevation of Privilege","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2020-12-23T19:06:10.000Z","orgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","shortName":"microsoft"},"references":[{"tags":["x_refsource_MISC"],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0986"},{"tags":["x_refsource_MISC"],"url":"http://packetstormsecurity.com/files/160698/Microsoft-Windows-splWOW64-Privilege-Escalation.html"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"secure@microsoft.com","ID":"CVE-2020-0986","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Windows","version":{"version_data":[{"version_value":"10 Version 1803 for 32-bit Systems"},{"version_value":"10 Version 1803 for x64-based Systems"},{"version_value":"10 Version 1803 for ARM64-based Systems"},{"version_value":"10 Version 1809 for 32-bit Systems"},{"version_value":"10 Version 1809 for x64-based Systems"},{"version_value":"10 Version 1809 for ARM64-based Systems"},{"version_value":"10 Version 1709 for 32-bit Systems"},{"version_value":"10 Version 1709 for x64-based Systems"},{"version_value":"10 Version 1709 for ARM64-based Systems"},{"version_value":"10 for 32-bit Systems"},{"version_value":"10 for x64-based Systems"},{"version_value":"10 Version 1607 for 32-bit Systems"},{"version_value":"10 Version 1607 for x64-based Systems"},{"version_value":"8.1 for 32-bit systems"},{"version_value":"8.1 for x64-based systems"},{"version_value":"RT 8.1"}]}},{"product_name":"Windows Server","version":{"version_data":[{"version_value":"version 1803  (Core Installation)"},{"version_value":"2019"},{"version_value":"2019  (Core installation)"},{"version_value":"2016"},{"version_value":"2016  (Core installation)"},{"version_value":"2012"},{"version_value":"2012 (Core installation)"},{"version_value":"2012 R2"},{"version_value":"2012 R2 (Core installation)"}]}},{"product_name":"Windows 10 Version 1909 for 32-bit Systems","version":{"version_data":[{"version_value":""}]}},{"product_name":"Windows 10 Version 1909 for x64-based Systems","version":{"version_data":[{"version_value":""}]}},{"product_name":"Windows 10 Version 1909 for ARM64-based Systems","version":{"version_data":[{"version_value":""}]}},{"product_name":"Windows Server, version 1909 (Server Core installation)","version":{"version_data":[{"version_value":""}]}},{"product_name":"Windows 10 Version 1903 for 32-bit Systems","version":{"version_data":[{"version_value":""}]}},{"product_name":"Windows 10 Version 1903 for x64-based Systems","version":{"version_data":[{"version_value":""}]}},{"product_name":"Windows 10 Version 1903 for ARM64-based Systems","version":{"version_data":[{"version_value":""}]}},{"product_name":"Windows Server, version 1903 (Server Core installation)","version":{"version_data":[{"version_value":""}]}},{"product_name":"Windows 10 Version 2004 for 32-bit Systems","version":{"version_data":[{"version_value":""}]}},{"product_name":"Windows Server, version 2004 (Server Core installation)","version":{"version_data":[{"version_value":""}]}},{"product_name":"Windows 10 Version 2004 for ARM64-based Systems","version":{"version_data":[{"version_value":""}]}},{"product_name":"Windows 10 Version 2004 for x64-based Systems","version":{"version_data":[{"version_value":""}]}}]},"vendor_name":"Microsoft"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1237, CVE-2020-1246, CVE-2020-1262, CVE-2020-1264, CVE-2020-1266, CVE-2020-1269, CVE-2020-1273, CVE-2020-1274, CVE-2020-1275, CVE-2020-1276, CVE-2020-1307, CVE-2020-1316."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Elevation of Privilege"}]}]},"references":{"reference_data":[{"name":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0986","refsource":"MISC","url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0986"},{"name":"http://packetstormsecurity.com/files/160698/Microsoft-Windows-splWOW64-Privilege-Escalation.html","refsource":"MISC","url":"http://packetstormsecurity.com/files/160698/Microsoft-Windows-splWOW64-Privilege-Escalation.html"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T06:18:03.566Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0986"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://packetstormsecurity.com/files/160698/Microsoft-Windows-splWOW64-Privilege-Escalation.html"}]},{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.8,"attackVector":"LOCAL","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"id":"CVE-2020-0986","role":"CISA Coordinator","options":[{"Exploitation":"active"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-02-07T15:01:08.808827Z"}}},{"other":{"type":"kev","content":{"dateAdded":"2021-11-03","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-0986"}}}],"references":[{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-0986","tags":["government-resource"]}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","cweId":"CWE-787","description":"CWE-787 Out-of-bounds Write"}]}],"timeline":[{"time":"2021-11-03T00:00:00.000Z","lang":"en","value":"CVE-2020-0986 added to CISA KEV"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-21T23:35:42.145Z"}}]},"cveMetadata":{"assignerOrgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","assignerShortName":"microsoft","cveId":"CVE-2020-0986","datePublished":"2020-06-09T19:43:14.000Z","dateReserved":"2019-11-04T00:00:00.000Z","dateUpdated":"2025-10-21T23:35:42.145Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}