9.3
CVE-2020-1113
- EPSS 1.46%
- Veröffentlicht 21.05.2020 23:15:15
- Zuletzt bearbeitet 21.11.2024 05:09:46
- Quelle secure@microsoft.com
- Teams Watchlist Login
- Unerledigt Login
A security feature bypass vulnerability exists in Microsoft Windows when the Task Scheduler service fails to properly verify client connections over RPC, aka 'Windows Task Scheduler Security Feature Bypass Vulnerability'.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Microsoft ≫ Windows 10 Version- HwPlatformx64
Microsoft ≫ Windows 10 Version- HwPlatformx86
Microsoft ≫ Windows 10 Version1607 HwPlatformx64
Microsoft ≫ Windows 10 Version1607 HwPlatformx86
Microsoft ≫ Windows 10 Version1709
Microsoft ≫ Windows 10 Version1803
Microsoft ≫ Windows 10 Version1809
Microsoft ≫ Windows 10 Version1903
Microsoft ≫ Windows 10 Version1909
Microsoft ≫ Windows 8.1 Version- HwPlatformx64
Microsoft ≫ Windows 8.1 Version- HwPlatformx86
Microsoft ≫ Windows Rt 8.1 Version-
Microsoft ≫ Windows Server 2008 Version- Updatesp2 Editionitanium
Microsoft ≫ Windows Server 2008 Version- Updatesp2 Editionx64
Microsoft ≫ Windows Server 2008 Version- Updatesp2 Editionx86
Microsoft ≫ Windows Server 2012 Version-
Microsoft ≫ Windows Server 2012 Versionr2
Microsoft ≫ Windows Server 2016 Version-
Microsoft ≫ Windows Server 2019 Version-
Microsoft ≫ Windows Server 2019 Version1903
Microsoft ≫ Windows Server 2019 Version1909
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 1.46% | 0.803 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 1.6 | 5.9 |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 9.3 | 8.6 | 10 |
AV:N/AC:M/Au:N/C:C/I:C/A:C
|
CWE-295 Improper Certificate Validation
The product does not validate, or incorrectly validates, a certificate.