The proof-of-concept exploit against elevation of privilege vulnerability (CVE-2020-17087) in Microsoft's Windows kernel has been observed. The vulnerability affects Windows Servers 2008 R2 or later and Windows 7 or later. System administrators are advised to take immediate action to patch your affected systems to mitigate the elevated risk of cyber attacks.
Internet Explorer 11
Microsoft Edge (EdgeHTML-based)
Microsoft Windows 7, 8.1, RT 8.1, 10
Microsoft Windows Server 2008, 2008 R2, 2012, 2012 R2, 2016, 2019
Microsoft Windows Server, version 1903, version 1909, version 2004, version 20H2
Microsoft Office 2010, 2013, 2013 RT, 2016, 2019, 2019 for Mac
Microsoft Office Online Server
Microsoft Office Web Apps 2013
Microsoft Excel 2010, 2013, 2013 RT, 2016
Microsoft Word 2010, 2013, 2013 RT, 2016
Microsoft Exchange Server 2013, 2016, 2019
Microsoft 365 Apps for Enterprise
Microsoft Dynamics 365 (on-premises) version 8.2, 9.0
Microsoft Dynamics CRM 2015 (on-premises) version 7.0
Microsoft SharePoint Foundation 2010, 2013
Microsoft SharePoint Enterprise Server 2013, 2016
Microsoft SharePoint Server 2010, 2019
Microsoft Visual Studio 2017, 2019
Azure DevOps Server
Visual Studio Code
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, elevation of privilege, denial of service, information disclosure, security feature bypass, spoofing and tampering.
Patches for affected products are available from the Windows Update / Microsoft Update Catalog. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.