{"containers":{"cna":{"title":"Windows ARM Information Disclosure Vulnerability","datePublic":"2020-08-11T07:00:00.000Z","affected":[{"vendor":"Microsoft","product":"Windows 10 Version 1809","cpes":["cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*"],"platforms":["ARM64-based Systems"],"versions":[{"version":"10.0.0","lessThan":"publication","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows 10 Version 1909","cpes":["cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*"],"platforms":["ARM64-based Systems"],"versions":[{"version":"10.0.0","lessThan":"publication","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows 10 Version 1903 for ARM64-based Systems","cpes":["cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*"],"platforms":["Unknown"],"versions":[{"version":"10.0.0","lessThan":"publication","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows 10 Version 2004","cpes":["cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*"],"platforms":["ARM64-based Systems"],"versions":[{"version":"10.0.0","lessThan":"publication","versionType":"custom","status":"affected"}]}],"descriptions":[{"value":"An information disclosure vulnerability exists on ARM implementations that use speculative execution in control flow via a side-channel analysis, aka &quot;straight-line speculation.&quot;\nTo exploit this vulnerability, an attacker with local privileges would need to run a specially crafted application.\nThe security update addresses the vulnerability by bypassing the speculative execution.","lang":"en-US"}],"problemTypes":[{"descriptions":[{"description":"Information Disclosure","lang":"en-US","type":"Impact"}]}],"providerMetadata":{"orgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","shortName":"microsoft","dateUpdated":"2024-05-29T16:32:48.181Z"},"references":[{"tags":["x_refsource_MISC"],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1459"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en-US","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","baseSeverity":"HIGH","baseScore":7.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C"}}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T06:39:09.644Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1459"}]}]},"cveMetadata":{"assignerOrgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","assignerShortName":"microsoft","cveId":"CVE-2020-1459","datePublished":"2020-08-17T19:13:02.000Z","dateReserved":"2019-11-04T00:00:00.000Z","dateUpdated":"2024-08-04T06:39:09.644Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}