{"containers":{"cna":{"affected":[{"product":"Windows","vendor":"Microsoft","versions":[{"status":"affected","version":"10 Version 1803 for 32-bit Systems"},{"status":"affected","version":"10 Version 1803 for x64-based Systems"},{"status":"affected","version":"10 Version 1803 for ARM64-based Systems"},{"status":"affected","version":"10 Version 1809 for 32-bit Systems"},{"status":"affected","version":"10 Version 1809 for x64-based Systems"},{"status":"affected","version":"10 Version 1809 for ARM64-based Systems"},{"status":"affected","version":"10 Version 1709 for 32-bit Systems"},{"status":"affected","version":"10 Version 1709 for x64-based Systems"},{"status":"affected","version":"10 Version 1709 for ARM64-based Systems"},{"status":"affected","version":"10 for 32-bit Systems"},{"status":"affected","version":"10 for x64-based Systems"},{"status":"affected","version":"10 Version 1607 for 32-bit Systems"},{"status":"affected","version":"10 Version 1607 for x64-based Systems"},{"status":"affected","version":"7 for 32-bit Systems Service Pack 1"},{"status":"affected","version":"7 for x64-based Systems Service Pack 1"},{"status":"affected","version":"8.1 for 32-bit systems"},{"status":"affected","version":"8.1 for x64-based systems"},{"status":"affected","version":"RT 8.1"}]},{"product":"Windows Server","vendor":"Microsoft","versions":[{"status":"affected","version":"version 1803  (Core Installation)"},{"status":"affected","version":"2019"},{"status":"affected","version":"2019  (Core installation)"},{"status":"affected","version":"2016"},{"status":"affected","version":"2016  (Core installation)"},{"status":"affected","version":"2008 for 32-bit Systems Service Pack 2"},{"status":"affected","version":"2008 for 32-bit Systems Service Pack 2 (Core installation)"},{"status":"affected","version":"2008 for Itanium-Based Systems Service Pack 2"},{"status":"affected","version":"2008 for x64-based Systems Service Pack 2"},{"status":"affected","version":"2008 for x64-based Systems Service Pack 2 (Core installation)"},{"status":"affected","version":"2008 R2 for Itanium-Based Systems Service Pack 1"},{"status":"affected","version":"2008 R2 for x64-based Systems Service Pack 1"},{"status":"affected","version":"2008 R2 for x64-based Systems Service Pack 1 (Core installation)"},{"status":"affected","version":"2012"},{"status":"affected","version":"2012 (Core installation)"},{"status":"affected","version":"2012 R2"},{"status":"affected","version":"2012 R2 (Core installation)"}]},{"product":"Windows 10 Version 1909 for 32-bit Systems","vendor":"Microsoft","versions":[{"status":"affected","version":"unspecified"}]},{"product":"Windows 10 Version 1909 for x64-based Systems","vendor":"Microsoft","versions":[{"status":"affected","version":"unspecified"}]},{"product":"Windows 10 Version 1909 for ARM64-based Systems","vendor":"Microsoft","versions":[{"status":"affected","version":"unspecified"}]},{"product":"Windows Server, version 1909 (Server Core installation)","vendor":"Microsoft","versions":[{"status":"affected","version":"unspecified"}]},{"product":"Windows 10 Version 1903 for 32-bit Systems","vendor":"Microsoft","versions":[{"status":"affected","version":"unspecified"}]},{"product":"Windows 10 Version 1903 for x64-based Systems","vendor":"Microsoft","versions":[{"status":"affected","version":"unspecified"}]},{"product":"Windows 10 Version 1903 for ARM64-based Systems","vendor":"Microsoft","versions":[{"status":"affected","version":"unspecified"}]},{"product":"Windows Server, version 1903 (Server Core installation)","vendor":"Microsoft","versions":[{"status":"affected","version":"unspecified"}]}],"descriptions":[{"lang":"en","value":"An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0913, CVE-2020-1000, CVE-2020-1003."}],"problemTypes":[{"descriptions":[{"description":"Elevation of Privilege","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2022-08-12T16:10:23.000Z","orgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","shortName":"microsoft"},"references":[{"tags":["x_refsource_MISC"],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1027"},{"tags":["x_refsource_MISC"],"url":"http://packetstormsecurity.com/files/168068/Windows-sxs-CNodeFactory-XMLParser_Element_doc_assembly_assemblyIdentity-Heap-Buffer-Overflow.html"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"secure@microsoft.com","ID":"CVE-2020-1027","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Windows","version":{"version_data":[{"version_value":"10 Version 1803 for 32-bit Systems"},{"version_value":"10 Version 1803 for x64-based Systems"},{"version_value":"10 Version 1803 for ARM64-based Systems"},{"version_value":"10 Version 1809 for 32-bit Systems"},{"version_value":"10 Version 1809 for x64-based Systems"},{"version_value":"10 Version 1809 for ARM64-based Systems"},{"version_value":"10 Version 1709 for 32-bit Systems"},{"version_value":"10 Version 1709 for x64-based Systems"},{"version_value":"10 Version 1709 for ARM64-based Systems"},{"version_value":"10 for 32-bit Systems"},{"version_value":"10 for x64-based Systems"},{"version_value":"10 Version 1607 for 32-bit Systems"},{"version_value":"10 Version 1607 for x64-based Systems"},{"version_value":"7 for 32-bit Systems Service Pack 1"},{"version_value":"7 for x64-based Systems Service Pack 1"},{"version_value":"8.1 for 32-bit systems"},{"version_value":"8.1 for x64-based systems"},{"version_value":"RT 8.1"}]}},{"product_name":"Windows Server","version":{"version_data":[{"version_value":"version 1803  (Core Installation)"},{"version_value":"2019"},{"version_value":"2019  (Core installation)"},{"version_value":"2016"},{"version_value":"2016  (Core installation)"},{"version_value":"2008 for 32-bit Systems Service Pack 2"},{"version_value":"2008 for 32-bit Systems Service Pack 2 (Core installation)"},{"version_value":"2008 for Itanium-Based Systems Service Pack 2"},{"version_value":"2008 for x64-based Systems Service Pack 2"},{"version_value":"2008 for x64-based Systems Service Pack 2 (Core installation)"},{"version_value":"2008 R2 for Itanium-Based Systems Service Pack 1"},{"version_value":"2008 R2 for x64-based Systems Service Pack 1"},{"version_value":"2008 R2 for x64-based Systems Service Pack 1 (Core installation)"},{"version_value":"2012"},{"version_value":"2012 (Core installation)"},{"version_value":"2012 R2"},{"version_value":"2012 R2 (Core installation)"}]}},{"product_name":"Windows 10 Version 1909 for 32-bit Systems","version":{"version_data":[{"version_value":""}]}},{"product_name":"Windows 10 Version 1909 for x64-based Systems","version":{"version_data":[{"version_value":""}]}},{"product_name":"Windows 10 Version 1909 for ARM64-based Systems","version":{"version_data":[{"version_value":""}]}},{"product_name":"Windows Server, version 1909 (Server Core installation)","version":{"version_data":[{"version_value":""}]}},{"product_name":"Windows 10 Version 1903 for 32-bit Systems","version":{"version_data":[{"version_value":""}]}},{"product_name":"Windows 10 Version 1903 for x64-based Systems","version":{"version_data":[{"version_value":""}]}},{"product_name":"Windows 10 Version 1903 for ARM64-based Systems","version":{"version_data":[{"version_value":""}]}},{"product_name":"Windows Server, version 1903 (Server Core installation)","version":{"version_data":[{"version_value":""}]}}]},"vendor_name":"Microsoft"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0913, CVE-2020-1000, CVE-2020-1003."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Elevation of Privilege"}]}]},"references":{"reference_data":[{"name":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1027","refsource":"MISC","url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1027"},{"name":"http://packetstormsecurity.com/files/168068/Windows-sxs-CNodeFactory-XMLParser_Element_doc_assembly_assemblyIdentity-Heap-Buffer-Overflow.html","refsource":"MISC","url":"http://packetstormsecurity.com/files/168068/Windows-sxs-CNodeFactory-XMLParser_Element_doc_assembly_assemblyIdentity-Heap-Buffer-Overflow.html"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T06:25:00.878Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1027"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://packetstormsecurity.com/files/168068/Windows-sxs-CNodeFactory-XMLParser_Element_doc_assembly_assemblyIdentity-Heap-Buffer-Overflow.html"}]},{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.8,"attackVector":"LOCAL","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"id":"CVE-2020-1027","role":"CISA Coordinator","options":[{"Exploitation":"active"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-02-07T15:14:06.659846Z"}}},{"other":{"type":"kev","content":{"dateAdded":"2022-05-23","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-1027"}}}],"references":[{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-1027","tags":["government-resource"]}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","cweId":"CWE-787","description":"CWE-787 Out-of-bounds Write"}]}],"timeline":[{"time":"2022-05-23T00:00:00.000Z","lang":"en","value":"CVE-2020-1027 added to CISA KEV"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-21T23:35:46.038Z"}}]},"cveMetadata":{"assignerOrgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","assignerShortName":"microsoft","cveId":"CVE-2020-1027","datePublished":"2020-04-15T15:13:29.000Z","dateReserved":"2019-11-04T00:00:00.000Z","dateUpdated":"2025-10-21T23:35:46.038Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}