Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-0610 (GCVE-0-2020-0610)
Vulnerability from cvelistv5 – Published: 2020-01-14 23:11 – Updated: 2024-08-04 06:11- Remote Code Execution
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Microsoft | Windows Server |
Affected:
2019
Affected: 2016 Affected: 2012 Affected: 2012 R2 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T06:11:04.613Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0610"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Windows Server",
"vendor": "Microsoft",
"versions": [
{
"status": "affected",
"version": "2019"
},
{
"status": "affected",
"version": "2016"
},
{
"status": "affected",
"version": "2012"
},
{
"status": "affected",
"version": "2012 R2"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka \u0027Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability\u0027. This CVE ID is unique from CVE-2020-0609."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Remote Code Execution",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-01-14T23:11:23",
"orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"shortName": "microsoft"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0610"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2020-0610",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Windows Server",
"version": {
"version_data": [
{
"version_value": "2019"
},
{
"version_value": "2016"
},
{
"version_value": "2012"
},
{
"version_value": "2012 R2"
}
]
}
}
]
},
"vendor_name": "Microsoft"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka \u0027Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability\u0027. This CVE ID is unique from CVE-2020-0609."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0610",
"refsource": "MISC",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0610"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"assignerShortName": "microsoft",
"cveId": "CVE-2020-0610",
"datePublished": "2020-01-14T23:11:23",
"dateReserved": "2019-11-04T00:00:00",
"dateUpdated": "2024-08-04T06:11:04.613Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7DF96F8-BA6A-4780-9CA3-F719B3F81074\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB18C4CE-5917-401E-ACF7-2747084FD36E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB79EE26-FC32-417D-A49C-A1A63165A968\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka \u0027Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability\u0027. This CVE ID is unique from CVE-2020-0609.\"}, {\"lang\": \"es\", \"value\": \"Se presenta una vulnerabilidad de ejecuci\\u00f3n de c\\u00f3digo remota en Windows Remote Desktop Gateway (RD Gateway) cuando un atacante no autenticado conecta con el sistema de destino mediante RDP y env\\u00eda peticiones especialmente dise\\u00f1adas, tambi\\u00e9n se conoce como \\\"Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability\\\". Este ID de CVE es diferente de CVE-2020-0609.\"}]",
"id": "CVE-2020-0610",
"lastModified": "2024-11-21T04:53:51.210",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 10.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2020-01-14T23:15:30.770",
"references": "[{\"url\": \"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0610\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0610\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}]",
"sourceIdentifier": "secure@microsoft.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2020-0610\",\"sourceIdentifier\":\"secure@microsoft.com\",\"published\":\"2020-01-14T23:15:30.770\",\"lastModified\":\"2024-11-21T04:53:51.210\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka \u0027Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability\u0027. This CVE ID is unique from CVE-2020-0609.\"},{\"lang\":\"es\",\"value\":\"Se presenta una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo remota en Windows Remote Desktop Gateway (RD Gateway) cuando un atacante no autenticado conecta con el sistema de destino mediante RDP y env\u00eda peticiones especialmente dise\u00f1adas, tambi\u00e9n se conoce como \\\"Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability\\\". Este ID de CVE es diferente de CVE-2020-0609.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7DF96F8-BA6A-4780-9CA3-F719B3F81074\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB18C4CE-5917-401E-ACF7-2747084FD36E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB79EE26-FC32-417D-A49C-A1A63165A968\"}]}]}],\"references\":[{\"url\":\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0610\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0610\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}"
}
}
GHSA-RFQR-XR33-6QPG
Vulnerability from github – Published: 2022-05-24 17:06 – Updated: 2022-05-24 17:06A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0609.
{
"affected": [],
"aliases": [
"CVE-2020-0610"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2020-01-14T23:15:00Z",
"severity": "HIGH"
},
"details": "A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka \u0027Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability\u0027. This CVE ID is unique from CVE-2020-0609.",
"id": "GHSA-rfqr-xr33-6qpg",
"modified": "2022-05-24T17:06:16Z",
"published": "2022-05-24T17:06:16Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0610"
},
{
"type": "WEB",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0610"
}
],
"schema_version": "1.4.0",
"severity": []
}
CERTFR-2020-ALE-005
Vulnerability from certfr_alerte - Published: - Updated:
[Mise à jour du 29 janvier 2020]
Du code d'attaque est désormais disponible publiquement concernant l'exploitation des vulnérabilités CVE-2020-0609 et CVE-2020-0610.
Pour l'instant, le code publique ne permet en l'état qu'un déni de service. Toutefois, il a été annoncé que du code d'attaque permettant une exécution de code arbitraire à distance sera bientôt publié. Cela rendra possible l'exploitation de ces vulnérabilités même à des attaquants d'un faible niveau technique.
Le CERT-FR insiste sur l'importance d'appliquer les correctifs dans les plus brefs délais.
[Version Initiale]
Depuis Microsoft Windows Server 2012, la passerelle d'accès distant Microsoft Remote Desktop Gateway (RD Gateway) intègre par défaut de nouvelles fonctionnalités dénommées RemoteFX améliorant la prise en charge de certains contenus multimédias et également l'optimisation du trafic réseau sur des liaisons de faible capacité. Dénommée RemoteFX for WAN, cette optimisation réseau permet de mettre en oeuvre le protocole RDP sur UDP avec chiffrement DTLS.
La fonction principale de la solution RD Gateway est de cloisonner les flux internes nécessaires au fonctionnement des Remote Desktop Services et de ne présenter que des interfaces HTTPS et DTLS sur Internet.
Le 14 janvier, Microsoft a émis deux avis de sécurité concernant deux vulnérabilités qui permettent une exécution de code à distance sans authentification préalable.
Qu'elle soit exposée sur Internet ou bien située sur une interconnexion du système d'information, une telle passerelle est de par sa fonction exposée. Elle constitue un élément critique de l'architecture d'un réseau et toute vulnérabilité doit donc être corrigée dans les plus brefs délais.
Solution
L'ANSSI recommande d'appliquer les correctifs mis à disposition par Microsoft dans le cadre de son programme Patch Tuesday (en date du 14 janvier) sans délai.
Dans l'éventualité où ces correctifs ne sont pas applicables rapidement, l'ANSSI suggère de désactiver le transport UDP pour le service Remote Desktop Gateway. Par ailleurs, ce mode de transport est voué à améliorer l'expérience utilisateur en cas d'utilisation d'un réseau de faible capacité, par conséquent, si le besoin n'est pas avéré, il est fortement recommandé de désactiver définitivement ce mode de transport.
La désactivation du transport UDP s'applique en passant par les propriétés du serveur RD Gateway :
- Dans l'onglet « Transport Parameters », « UDP transport parameters », décocher la case « enable UDP transport »
- Dans l'onglet « SSL bridging », décocher « utiliser le SSL bridging », décocher la case « HTTPS-HTTP bridging »
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows Server 2012",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"closed_at": "2020-02-19",
"content": "## Solution\n\nL\u0027ANSSI recommande d\u0027appliquer les correctifs mis \u00e0 disposition par\nMicrosoft dans le cadre de son programme *Patch Tuesday* (en date du 14\njanvier) sans d\u00e9lai.\n\nDans l\u0027\u00e9ventualit\u00e9 o\u00f9 ces correctifs ne sont pas applicables rapidement,\nl\u0027ANSSI sugg\u00e8re de d\u00e9sactiver le transport UDP pour le service *Remote\nDesktop Gateway.* Par ailleurs, ce mode de transport est vou\u00e9 \u00e0\nam\u00e9liorer l\u0027exp\u00e9rience utilisateur en cas d\u0027utilisation d\u0027un r\u00e9seau de\nfaible capacit\u00e9, par cons\u00e9quent, si le besoin n\u0027est pas av\u00e9r\u00e9, il est\nfortement recommand\u00e9 de d\u00e9sactiver d\u00e9finitivement ce mode de transport.\n\nLa d\u00e9sactivation du transport UDP s\u0027applique en passant par les\npropri\u00e9t\u00e9s du serveur *RD Gateway* :\n\n- Dans l\u0027onglet \u00ab *Transport Parameters* \u00bb, \u00ab *UDP transport\n parameters* \u00bb, d\u00e9cocher la case \u00ab *enable UDP transport* \u00bb\n- Dans l\u0027onglet \u00ab *SSL bridging* \u00bb, d\u00e9cocher \u00ab *utiliser le SSL\n bridging* \u00bb, d\u00e9cocher la case \u00ab *HTTPS-HTTP bridging* \u00bb\n",
"cves": [
{
"name": "CVE-2020-0609",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0609"
},
{
"name": "CVE-2020-0610",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0610"
}
],
"links": [
{
"title": "Avis CERT-FR CERTFR-2020-AVI-026 du 14 janvier 2020",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2020-AVI-026/"
}
],
"reference": "CERTFR-2020-ALE-005",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-01-14T00:00:00.000000"
},
{
"description": "Correction lien CVE-2020-0609",
"revision_date": "2020-01-15T00:00:00.000000"
},
{
"description": "Annonce de la publication du code d\u0027attaque.",
"revision_date": "2020-01-29T00:00:00.000000"
},
{
"description": "Cl\u00f4ture de l\u0027alerte. La cl\u00f4ture d\u0027une alerte ne signifie pas la fin d\u0027une menace. Seule l\u0027application de la mise \u00e0 jour permet de vous pr\u00e9munir contre l\u0027exploitation de la vuln\u00e9rabilit\u00e9 correspondante.",
"revision_date": "2020-02-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "\u003cstrong\u003e\\[Mise \u00e0 jour du 29 janvier 2020\\]\u003c/strong\u003e\n\nDu code d\u0027attaque est d\u00e9sormais disponible publiquement concernant\nl\u0027exploitation des vuln\u00e9rabilit\u00e9s CVE-2020-0609 et\u00a0CVE-2020-0610.\n\nPour l\u0027instant, le code publique ne permet en l\u0027\u00e9tat qu\u0027un d\u00e9ni de\nservice. Toutefois, il a \u00e9t\u00e9 annonc\u00e9 que du code d\u0027attaque permettant\nune ex\u00e9cution de code arbitraire \u00e0 distance sera bient\u00f4t publi\u00e9. Cela\nrendra possible l\u0027exploitation de ces vuln\u00e9rabilit\u00e9s m\u00eame \u00e0 des\nattaquants d\u0027un faible niveau technique.\n\nLe CERT-FR insiste sur l\u0027importance d\u0027appliquer les correctifs dans les\nplus brefs d\u00e9lais.\n\n\u003cstrong\u003e\\[Version Initiale\\]\u003c/strong\u003e\n\nDepuis Microsoft Windows Server 2012, la passerelle d\u0027acc\u00e8s distant\n*Microsoft Remote Desktop Gateway* (*RD Gateway*) int\u00e8gre par d\u00e9faut de\nnouvelles fonctionnalit\u00e9s d\u00e9nomm\u00e9es *RemoteFX* am\u00e9liorant la prise en\ncharge de certains contenus multim\u00e9dias et \u00e9galement l\u0027optimisation du\ntrafic r\u00e9seau sur des liaisons de faible capacit\u00e9. D\u00e9nomm\u00e9e *RemoteFX\nfor WAN*, cette optimisation r\u00e9seau permet de mettre en oeuvre le\nprotocole RDP sur UDP avec chiffrement DTLS.\n\nLa fonction principale de la solution *RD Gateway* est de cloisonner les\nflux internes n\u00e9cessaires au fonctionnement des *Remote Desktop\nServices* et de ne pr\u00e9senter que des interfaces *HTTPS* et *DTLS* sur\nInternet.\n\nLe 14 janvier, Microsoft a \u00e9mis deux avis de s\u00e9curit\u00e9 concernant deux\nvuln\u00e9rabilit\u00e9s qui permettent une ex\u00e9cution de code \u00e0 distance sans\nauthentification pr\u00e9alable.\n\nQu\u0027elle soit expos\u00e9e sur Internet ou bien situ\u00e9e sur une interconnexion\ndu syst\u00e8me d\u0027information, une telle passerelle est de par sa fonction\nexpos\u00e9e. Elle constitue un \u00e9l\u00e9ment critique de l\u0027architecture d\u0027un\nr\u00e9seau et toute vuln\u00e9rabilit\u00e9 doit donc \u00eatre corrig\u00e9e dans les plus\nbrefs d\u00e9lais.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le serveur de passerelle RDP de Windows",
"vendor_advisories": [
{
"published_at": null,
"title": "Note de publication Microsoft du 14 janvier 2020",
"url": "https://portal.msrc.microsoft.com/fr-fr/security-guidance/releasenotedetail/2020-Jan"
},
{
"published_at": null,
"title": "Avis de s\u00e9curit\u00e9 Microsoft du 14 janvier 2020",
"url": "https://portal.msrc.microsoft.com/fr-FR/security-guidance"
}
]
}
CERTFR-2020-ALE-005
Vulnerability from certfr_alerte - Published: - Updated:
[Mise à jour du 29 janvier 2020]
Du code d'attaque est désormais disponible publiquement concernant l'exploitation des vulnérabilités CVE-2020-0609 et CVE-2020-0610.
Pour l'instant, le code publique ne permet en l'état qu'un déni de service. Toutefois, il a été annoncé que du code d'attaque permettant une exécution de code arbitraire à distance sera bientôt publié. Cela rendra possible l'exploitation de ces vulnérabilités même à des attaquants d'un faible niveau technique.
Le CERT-FR insiste sur l'importance d'appliquer les correctifs dans les plus brefs délais.
[Version Initiale]
Depuis Microsoft Windows Server 2012, la passerelle d'accès distant Microsoft Remote Desktop Gateway (RD Gateway) intègre par défaut de nouvelles fonctionnalités dénommées RemoteFX améliorant la prise en charge de certains contenus multimédias et également l'optimisation du trafic réseau sur des liaisons de faible capacité. Dénommée RemoteFX for WAN, cette optimisation réseau permet de mettre en oeuvre le protocole RDP sur UDP avec chiffrement DTLS.
La fonction principale de la solution RD Gateway est de cloisonner les flux internes nécessaires au fonctionnement des Remote Desktop Services et de ne présenter que des interfaces HTTPS et DTLS sur Internet.
Le 14 janvier, Microsoft a émis deux avis de sécurité concernant deux vulnérabilités qui permettent une exécution de code à distance sans authentification préalable.
Qu'elle soit exposée sur Internet ou bien située sur une interconnexion du système d'information, une telle passerelle est de par sa fonction exposée. Elle constitue un élément critique de l'architecture d'un réseau et toute vulnérabilité doit donc être corrigée dans les plus brefs délais.
Solution
L'ANSSI recommande d'appliquer les correctifs mis à disposition par Microsoft dans le cadre de son programme Patch Tuesday (en date du 14 janvier) sans délai.
Dans l'éventualité où ces correctifs ne sont pas applicables rapidement, l'ANSSI suggère de désactiver le transport UDP pour le service Remote Desktop Gateway. Par ailleurs, ce mode de transport est voué à améliorer l'expérience utilisateur en cas d'utilisation d'un réseau de faible capacité, par conséquent, si le besoin n'est pas avéré, il est fortement recommandé de désactiver définitivement ce mode de transport.
La désactivation du transport UDP s'applique en passant par les propriétés du serveur RD Gateway :
- Dans l'onglet « Transport Parameters », « UDP transport parameters », décocher la case « enable UDP transport »
- Dans l'onglet « SSL bridging », décocher « utiliser le SSL bridging », décocher la case « HTTPS-HTTP bridging »
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows Server 2012",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"closed_at": "2020-02-19",
"content": "## Solution\n\nL\u0027ANSSI recommande d\u0027appliquer les correctifs mis \u00e0 disposition par\nMicrosoft dans le cadre de son programme *Patch Tuesday* (en date du 14\njanvier) sans d\u00e9lai.\n\nDans l\u0027\u00e9ventualit\u00e9 o\u00f9 ces correctifs ne sont pas applicables rapidement,\nl\u0027ANSSI sugg\u00e8re de d\u00e9sactiver le transport UDP pour le service *Remote\nDesktop Gateway.* Par ailleurs, ce mode de transport est vou\u00e9 \u00e0\nam\u00e9liorer l\u0027exp\u00e9rience utilisateur en cas d\u0027utilisation d\u0027un r\u00e9seau de\nfaible capacit\u00e9, par cons\u00e9quent, si le besoin n\u0027est pas av\u00e9r\u00e9, il est\nfortement recommand\u00e9 de d\u00e9sactiver d\u00e9finitivement ce mode de transport.\n\nLa d\u00e9sactivation du transport UDP s\u0027applique en passant par les\npropri\u00e9t\u00e9s du serveur *RD Gateway* :\n\n- Dans l\u0027onglet \u00ab *Transport Parameters* \u00bb, \u00ab *UDP transport\n parameters* \u00bb, d\u00e9cocher la case \u00ab *enable UDP transport* \u00bb\n- Dans l\u0027onglet \u00ab *SSL bridging* \u00bb, d\u00e9cocher \u00ab *utiliser le SSL\n bridging* \u00bb, d\u00e9cocher la case \u00ab *HTTPS-HTTP bridging* \u00bb\n",
"cves": [
{
"name": "CVE-2020-0609",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0609"
},
{
"name": "CVE-2020-0610",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0610"
}
],
"links": [
{
"title": "Avis CERT-FR CERTFR-2020-AVI-026 du 14 janvier 2020",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2020-AVI-026/"
}
],
"reference": "CERTFR-2020-ALE-005",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-01-14T00:00:00.000000"
},
{
"description": "Correction lien CVE-2020-0609",
"revision_date": "2020-01-15T00:00:00.000000"
},
{
"description": "Annonce de la publication du code d\u0027attaque.",
"revision_date": "2020-01-29T00:00:00.000000"
},
{
"description": "Cl\u00f4ture de l\u0027alerte. La cl\u00f4ture d\u0027une alerte ne signifie pas la fin d\u0027une menace. Seule l\u0027application de la mise \u00e0 jour permet de vous pr\u00e9munir contre l\u0027exploitation de la vuln\u00e9rabilit\u00e9 correspondante.",
"revision_date": "2020-02-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "\u003cstrong\u003e\\[Mise \u00e0 jour du 29 janvier 2020\\]\u003c/strong\u003e\n\nDu code d\u0027attaque est d\u00e9sormais disponible publiquement concernant\nl\u0027exploitation des vuln\u00e9rabilit\u00e9s CVE-2020-0609 et\u00a0CVE-2020-0610.\n\nPour l\u0027instant, le code publique ne permet en l\u0027\u00e9tat qu\u0027un d\u00e9ni de\nservice. Toutefois, il a \u00e9t\u00e9 annonc\u00e9 que du code d\u0027attaque permettant\nune ex\u00e9cution de code arbitraire \u00e0 distance sera bient\u00f4t publi\u00e9. Cela\nrendra possible l\u0027exploitation de ces vuln\u00e9rabilit\u00e9s m\u00eame \u00e0 des\nattaquants d\u0027un faible niveau technique.\n\nLe CERT-FR insiste sur l\u0027importance d\u0027appliquer les correctifs dans les\nplus brefs d\u00e9lais.\n\n\u003cstrong\u003e\\[Version Initiale\\]\u003c/strong\u003e\n\nDepuis Microsoft Windows Server 2012, la passerelle d\u0027acc\u00e8s distant\n*Microsoft Remote Desktop Gateway* (*RD Gateway*) int\u00e8gre par d\u00e9faut de\nnouvelles fonctionnalit\u00e9s d\u00e9nomm\u00e9es *RemoteFX* am\u00e9liorant la prise en\ncharge de certains contenus multim\u00e9dias et \u00e9galement l\u0027optimisation du\ntrafic r\u00e9seau sur des liaisons de faible capacit\u00e9. D\u00e9nomm\u00e9e *RemoteFX\nfor WAN*, cette optimisation r\u00e9seau permet de mettre en oeuvre le\nprotocole RDP sur UDP avec chiffrement DTLS.\n\nLa fonction principale de la solution *RD Gateway* est de cloisonner les\nflux internes n\u00e9cessaires au fonctionnement des *Remote Desktop\nServices* et de ne pr\u00e9senter que des interfaces *HTTPS* et *DTLS* sur\nInternet.\n\nLe 14 janvier, Microsoft a \u00e9mis deux avis de s\u00e9curit\u00e9 concernant deux\nvuln\u00e9rabilit\u00e9s qui permettent une ex\u00e9cution de code \u00e0 distance sans\nauthentification pr\u00e9alable.\n\nQu\u0027elle soit expos\u00e9e sur Internet ou bien situ\u00e9e sur une interconnexion\ndu syst\u00e8me d\u0027information, une telle passerelle est de par sa fonction\nexpos\u00e9e. Elle constitue un \u00e9l\u00e9ment critique de l\u0027architecture d\u0027un\nr\u00e9seau et toute vuln\u00e9rabilit\u00e9 doit donc \u00eatre corrig\u00e9e dans les plus\nbrefs d\u00e9lais.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le serveur de passerelle RDP de Windows",
"vendor_advisories": [
{
"published_at": null,
"title": "Note de publication Microsoft du 14 janvier 2020",
"url": "https://portal.msrc.microsoft.com/fr-fr/security-guidance/releasenotedetail/2020-Jan"
},
{
"published_at": null,
"title": "Avis de s\u00e9curit\u00e9 Microsoft du 14 janvier 2020",
"url": "https://portal.msrc.microsoft.com/fr-FR/security-guidance"
}
]
}
CERTFR-2020-AVI-026
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans Microsoft Windows. Elles permettent à un attaquant de provoquer une exécution de code à distance, une atteinte à la confidentialité des données, une élévation de privilèges, un contournement de la fonctionnalité de sécurité et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Windows Server 2012 | ||
| Microsoft | Windows | Windows 10 pour systèmes x64 | ||
| Microsoft | Windows | Windows 10 Version 1909 pour ARM64-based Systems | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes x64 | ||
| Microsoft | Windows | Windows 10 Version 1909 pour systèmes x64 | ||
| Microsoft | Windows | Windows 10 Version 1903 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2019 (Server Core installation) | ||
| Microsoft | Windows | Windows Server 2019 | ||
| Microsoft | Windows | Windows Server 2012 R2 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes Itanium Service Pack 1 | ||
| Microsoft | Windows | Windows 10 Version 1803 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 10 Version 1803 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows Server, version 1803 (Server Core Installation) | ||
| Microsoft | Windows | Windows 10 Version 1709 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows Server 2016 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 1903 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows RT 8.1 | ||
| Microsoft | Windows | Windows 7 pour systèmes x64 Service Pack 1 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour ARM64-based Systems | ||
| Microsoft | Windows | Windows 10 Version 1709 pour ARM64-based Systems | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 1909 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2012 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 1803 pour ARM64-based Systems | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 | ||
| Microsoft | Windows | Windows Server, version 1909 (Server Core installation) | ||
| Microsoft | Windows | Windows 8.1 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2016 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes Itanium Service Pack 2 | ||
| Microsoft | Windows | Windows 10 Version 1903 pour ARM64-based Systems | ||
| Microsoft | Windows | Windows 8.1 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) | ||
| Microsoft | Windows | Windows Server 2012 R2 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 7 pour systèmes 32 bits Service Pack 1 | ||
| Microsoft | Windows | Windows Server, version 1903 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 1709 pour systèmes x64 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows Server 2012",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1909 pour ARM64-based Systems",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1909 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1903 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes Itanium Service Pack 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1803 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1803 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server, version 1803 (Server Core Installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1709 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1903 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows RT 8.1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 7 pour syst\u00e8mes x64 Service Pack 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour ARM64-based Systems",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1709 pour ARM64-based Systems",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1909 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1803 pour ARM64-based Systems",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server, version 1909 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 8.1 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes Itanium Service Pack 2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1903 pour ARM64-based Systems",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 8.1 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 7 pour syst\u00e8mes 32 bits Service Pack 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server, version 1903 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1709 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-0625",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0625"
},
{
"name": "CVE-2020-0634",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0634"
},
{
"name": "CVE-2020-0628",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0628"
},
{
"name": "CVE-2020-0621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0621"
},
{
"name": "CVE-2020-0637",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0637"
},
{
"name": "CVE-2020-0627",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0627"
},
{
"name": "CVE-2020-0639",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0639"
},
{
"name": "CVE-2020-0633",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0633"
},
{
"name": "CVE-2020-0644",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0644"
},
{
"name": "CVE-2020-0630",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0630"
},
{
"name": "CVE-2020-0632",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0632"
},
{
"name": "CVE-2020-0642",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0642"
},
{
"name": "CVE-2020-0623",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0623"
},
{
"name": "CVE-2020-0613",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0613"
},
{
"name": "CVE-2020-0601",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0601"
},
{
"name": "CVE-2020-0612",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0612"
},
{
"name": "CVE-2020-0624",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0624"
},
{
"name": "CVE-2020-0631",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0631"
},
{
"name": "CVE-2020-0641",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0641"
},
{
"name": "CVE-2020-0609",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0609"
},
{
"name": "CVE-2020-0607",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0607"
},
{
"name": "CVE-2020-0629",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0629"
},
{
"name": "CVE-2020-0617",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0617"
},
{
"name": "CVE-2020-0616",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0616"
},
{
"name": "CVE-2020-0608",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0608"
},
{
"name": "CVE-2020-0611",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0611"
},
{
"name": "CVE-2020-0643",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0643"
},
{
"name": "CVE-2020-0610",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0610"
},
{
"name": "CVE-2020-0635",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0635"
},
{
"name": "CVE-2020-0620",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0620"
},
{
"name": "CVE-2020-0626",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0626"
},
{
"name": "CVE-2020-0614",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0614"
},
{
"name": "CVE-2020-0615",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0615"
},
{
"name": "CVE-2020-0638",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0638"
},
{
"name": "CVE-2020-0636",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0636"
},
{
"name": "CVE-2020-0622",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0622"
}
],
"links": [],
"reference": "CERTFR-2020-AVI-026",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-01-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la fonctionnalit\u00e9 de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eMicrosoft Windows\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer une ex\u00e9cution de code \u00e0 distance, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es, une \u00e9l\u00e9vation de privil\u00e8ges, un\ncontournement de la fonctionnalit\u00e9 de s\u00e9curit\u00e9 et un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 14 janvier 2020",
"url": "https://portal.msrc.microsoft.com/fr-FR/security-guidance"
}
]
}
CERTFR-2020-AVI-026
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans Microsoft Windows. Elles permettent à un attaquant de provoquer une exécution de code à distance, une atteinte à la confidentialité des données, une élévation de privilèges, un contournement de la fonctionnalité de sécurité et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Windows Server 2012 | ||
| Microsoft | Windows | Windows 10 pour systèmes x64 | ||
| Microsoft | Windows | Windows 10 Version 1909 pour ARM64-based Systems | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes x64 | ||
| Microsoft | Windows | Windows 10 Version 1909 pour systèmes x64 | ||
| Microsoft | Windows | Windows 10 Version 1903 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2019 (Server Core installation) | ||
| Microsoft | Windows | Windows Server 2019 | ||
| Microsoft | Windows | Windows Server 2012 R2 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes Itanium Service Pack 1 | ||
| Microsoft | Windows | Windows 10 Version 1803 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 10 Version 1803 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows Server, version 1803 (Server Core Installation) | ||
| Microsoft | Windows | Windows 10 Version 1709 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows Server 2016 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 1903 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows RT 8.1 | ||
| Microsoft | Windows | Windows 7 pour systèmes x64 Service Pack 1 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour ARM64-based Systems | ||
| Microsoft | Windows | Windows 10 Version 1709 pour ARM64-based Systems | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 1909 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2012 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 1803 pour ARM64-based Systems | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 | ||
| Microsoft | Windows | Windows Server, version 1909 (Server Core installation) | ||
| Microsoft | Windows | Windows 8.1 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2016 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes Itanium Service Pack 2 | ||
| Microsoft | Windows | Windows 10 Version 1903 pour ARM64-based Systems | ||
| Microsoft | Windows | Windows 8.1 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) | ||
| Microsoft | Windows | Windows Server 2012 R2 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 7 pour systèmes 32 bits Service Pack 1 | ||
| Microsoft | Windows | Windows Server, version 1903 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 1709 pour systèmes x64 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows Server 2012",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1909 pour ARM64-based Systems",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1909 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1903 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes Itanium Service Pack 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1803 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1803 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server, version 1803 (Server Core Installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1709 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1903 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows RT 8.1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 7 pour syst\u00e8mes x64 Service Pack 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour ARM64-based Systems",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1709 pour ARM64-based Systems",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1909 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1803 pour ARM64-based Systems",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server, version 1909 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 8.1 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes Itanium Service Pack 2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1903 pour ARM64-based Systems",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 8.1 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 7 pour syst\u00e8mes 32 bits Service Pack 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server, version 1903 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1709 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-0625",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0625"
},
{
"name": "CVE-2020-0634",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0634"
},
{
"name": "CVE-2020-0628",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0628"
},
{
"name": "CVE-2020-0621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0621"
},
{
"name": "CVE-2020-0637",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0637"
},
{
"name": "CVE-2020-0627",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0627"
},
{
"name": "CVE-2020-0639",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0639"
},
{
"name": "CVE-2020-0633",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0633"
},
{
"name": "CVE-2020-0644",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0644"
},
{
"name": "CVE-2020-0630",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0630"
},
{
"name": "CVE-2020-0632",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0632"
},
{
"name": "CVE-2020-0642",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0642"
},
{
"name": "CVE-2020-0623",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0623"
},
{
"name": "CVE-2020-0613",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0613"
},
{
"name": "CVE-2020-0601",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0601"
},
{
"name": "CVE-2020-0612",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0612"
},
{
"name": "CVE-2020-0624",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0624"
},
{
"name": "CVE-2020-0631",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0631"
},
{
"name": "CVE-2020-0641",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0641"
},
{
"name": "CVE-2020-0609",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0609"
},
{
"name": "CVE-2020-0607",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0607"
},
{
"name": "CVE-2020-0629",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0629"
},
{
"name": "CVE-2020-0617",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0617"
},
{
"name": "CVE-2020-0616",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0616"
},
{
"name": "CVE-2020-0608",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0608"
},
{
"name": "CVE-2020-0611",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0611"
},
{
"name": "CVE-2020-0643",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0643"
},
{
"name": "CVE-2020-0610",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0610"
},
{
"name": "CVE-2020-0635",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0635"
},
{
"name": "CVE-2020-0620",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0620"
},
{
"name": "CVE-2020-0626",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0626"
},
{
"name": "CVE-2020-0614",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0614"
},
{
"name": "CVE-2020-0615",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0615"
},
{
"name": "CVE-2020-0638",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0638"
},
{
"name": "CVE-2020-0636",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0636"
},
{
"name": "CVE-2020-0622",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0622"
}
],
"links": [],
"reference": "CERTFR-2020-AVI-026",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-01-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la fonctionnalit\u00e9 de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eMicrosoft Windows\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer une ex\u00e9cution de code \u00e0 distance, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es, une \u00e9l\u00e9vation de privil\u00e8ges, un\ncontournement de la fonctionnalit\u00e9 de s\u00e9curit\u00e9 et un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 14 janvier 2020",
"url": "https://portal.msrc.microsoft.com/fr-FR/security-guidance"
}
]
}
CERTFR-2021-AVI-772
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Schneider. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | IGSS Data Collector (dc.exe) versions antérieures à V15.0.0.21244 | ||
| N/A | N/A | fellerLYnk versions antérieures à V2.6.2 | ||
| N/A | N/A | micrologiciel TM5CSLC100FS version antérieures v2.57 | ||
| N/A | N/A | Conext Advisor 2 Gateway | ||
| N/A | N/A | spaceLYnk versions antérieures à V2.6.2 | ||
| N/A | N/A | micrologiciel TM5NS31 versions antérieures à 2.79 | ||
| N/A | N/A | Conext Advisor 2 Cloud | ||
| N/A | N/A | Wiser for KNX versions antérieures à V2.6.2 | ||
| N/A | N/A | Modicon M218 logic controller versions antérieures à 5.1.0.8 | ||
| N/A | N/A | micrologiciel TM5NEIP1 versions antérieures à 3.12 | ||
| N/A | N/A | ConneXium Network Manager | ||
| N/A | N/A | Conext Control V2 Gateway | ||
| N/A | N/A | micrologiciel TM5CSLC200FS version antérieures v2.57 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IGSS Data Collector (dc.exe) versions ant\u00e9rieures \u00e0 V15.0.0.21244",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "fellerLYnk versions ant\u00e9rieures \u00e0 V2.6.2",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "micrologiciel TM5CSLC100FS version ant\u00e9rieures v2.57",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Conext Advisor 2 Gateway",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "spaceLYnk versions ant\u00e9rieures \u00e0 V2.6.2",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "micrologiciel TM5NS31 versions ant\u00e9rieures \u00e0 2.79",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Conext Advisor 2 Cloud",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Wiser for KNX versions ant\u00e9rieures \u00e0 V2.6.2",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Modicon M218 logic controller versions ant\u00e9rieures \u00e0 5.1.0.8",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "micrologiciel TM5NEIP1 versions ant\u00e9rieures \u00e0 3.12",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "ConneXium Network Manager",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Conext Control V2 Gateway",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "micrologiciel TM5CSLC200FS version ant\u00e9rieures v2.57",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-17438",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-17438"
},
{
"name": "CVE-2019-0685",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0685"
},
{
"name": "CVE-2020-1472",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1472"
},
{
"name": "CVE-2020-0601",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0601"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2019-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0803"
},
{
"name": "CVE-2021-22801",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22801"
},
{
"name": "CVE-2020-0609",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0609"
},
{
"name": "CVE-2021-22802",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22802"
},
{
"name": "CVE-2019-0859",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0859"
},
{
"name": "CVE-2020-13987",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13987"
},
{
"name": "CVE-2020-1020",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1020"
},
{
"name": "CVE-2020-0610",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0610"
},
{
"name": "CVE-2020-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0938"
},
{
"name": "CVE-2020-1350",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1350"
},
{
"name": "CVE-2021-22800",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22800"
},
{
"name": "CVE-2021-22804",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22804"
},
{
"name": "CVE-2020-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0796"
},
{
"name": "CVE-2021-22803",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22803"
},
{
"name": "CVE-2021-22806",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22806"
},
{
"name": "CVE-2019-1040",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1040"
},
{
"name": "CVE-2021-22805",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22805"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-772",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-10-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSchneider. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Schneider",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-285-04 du 12 octobre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-285-04"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-285-03 du 12 octobre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-285-03"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-285-02 du 12 octobre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-285-02"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-285-05 du 12 octobre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-285-05"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-285-01 du 12 octobre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-285-01"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-285-06 du 12 octobre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-285-06"
}
]
}
CERTFR-2021-AVI-772
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Schneider. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | IGSS Data Collector (dc.exe) versions antérieures à V15.0.0.21244 | ||
| N/A | N/A | fellerLYnk versions antérieures à V2.6.2 | ||
| N/A | N/A | micrologiciel TM5CSLC100FS version antérieures v2.57 | ||
| N/A | N/A | Conext Advisor 2 Gateway | ||
| N/A | N/A | spaceLYnk versions antérieures à V2.6.2 | ||
| N/A | N/A | micrologiciel TM5NS31 versions antérieures à 2.79 | ||
| N/A | N/A | Conext Advisor 2 Cloud | ||
| N/A | N/A | Wiser for KNX versions antérieures à V2.6.2 | ||
| N/A | N/A | Modicon M218 logic controller versions antérieures à 5.1.0.8 | ||
| N/A | N/A | micrologiciel TM5NEIP1 versions antérieures à 3.12 | ||
| N/A | N/A | ConneXium Network Manager | ||
| N/A | N/A | Conext Control V2 Gateway | ||
| N/A | N/A | micrologiciel TM5CSLC200FS version antérieures v2.57 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IGSS Data Collector (dc.exe) versions ant\u00e9rieures \u00e0 V15.0.0.21244",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "fellerLYnk versions ant\u00e9rieures \u00e0 V2.6.2",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "micrologiciel TM5CSLC100FS version ant\u00e9rieures v2.57",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Conext Advisor 2 Gateway",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "spaceLYnk versions ant\u00e9rieures \u00e0 V2.6.2",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "micrologiciel TM5NS31 versions ant\u00e9rieures \u00e0 2.79",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Conext Advisor 2 Cloud",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Wiser for KNX versions ant\u00e9rieures \u00e0 V2.6.2",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Modicon M218 logic controller versions ant\u00e9rieures \u00e0 5.1.0.8",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "micrologiciel TM5NEIP1 versions ant\u00e9rieures \u00e0 3.12",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "ConneXium Network Manager",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Conext Control V2 Gateway",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "micrologiciel TM5CSLC200FS version ant\u00e9rieures v2.57",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-17438",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-17438"
},
{
"name": "CVE-2019-0685",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0685"
},
{
"name": "CVE-2020-1472",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1472"
},
{
"name": "CVE-2020-0601",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0601"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2019-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0803"
},
{
"name": "CVE-2021-22801",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22801"
},
{
"name": "CVE-2020-0609",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0609"
},
{
"name": "CVE-2021-22802",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22802"
},
{
"name": "CVE-2019-0859",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0859"
},
{
"name": "CVE-2020-13987",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13987"
},
{
"name": "CVE-2020-1020",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1020"
},
{
"name": "CVE-2020-0610",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0610"
},
{
"name": "CVE-2020-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0938"
},
{
"name": "CVE-2020-1350",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1350"
},
{
"name": "CVE-2021-22800",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22800"
},
{
"name": "CVE-2021-22804",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22804"
},
{
"name": "CVE-2020-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0796"
},
{
"name": "CVE-2021-22803",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22803"
},
{
"name": "CVE-2021-22806",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22806"
},
{
"name": "CVE-2019-1040",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1040"
},
{
"name": "CVE-2021-22805",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22805"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-772",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-10-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSchneider. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Schneider",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-285-04 du 12 octobre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-285-04"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-285-03 du 12 octobre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-285-03"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-285-02 du 12 octobre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-285-02"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-285-05 du 12 octobre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-285-05"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-285-01 du 12 octobre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-285-01"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-285-06 du 12 octobre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-285-06"
}
]
}
GSD-2020-0610
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2020-0610",
"description": "A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka \u0027Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability\u0027. This CVE ID is unique from CVE-2020-0609.",
"id": "GSD-2020-0610"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2020-0610"
],
"details": "A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka \u0027Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability\u0027. This CVE ID is unique from CVE-2020-0609.",
"id": "GSD-2020-0610",
"modified": "2023-12-13T01:21:44.960192Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2020-0610",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Windows Server",
"version": {
"version_data": [
{
"version_value": "2019"
},
{
"version_value": "2016"
},
{
"version_value": "2012"
},
{
"version_value": "2012 R2"
}
]
}
}
]
},
"vendor_name": "Microsoft"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka \u0027Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability\u0027. This CVE ID is unique from CVE-2020-0609."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0610",
"refsource": "MISC",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0610"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2020-0610"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka \u0027Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability\u0027. This CVE ID is unique from CVE-2020-0609."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "N/A",
"refsource": "N/A",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0610"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
},
"lastModifiedDate": "2021-07-21T11:39Z",
"publishedDate": "2020-01-14T23:15Z"
}
}
}
FKIE_CVE-2020-0610
Vulnerability from fkie_nvd - Published: 2020-01-14 23:15 - Updated: 2024-11-21 04:53| Vendor | Product | Version | |
|---|---|---|---|
| microsoft | windows_server_2012 | - | |
| microsoft | windows_server_2012 | r2 | |
| microsoft | windows_server_2016 | - | |
| microsoft | windows_server_2019 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka \u0027Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability\u0027. This CVE ID is unique from CVE-2020-0609."
},
{
"lang": "es",
"value": "Se presenta una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo remota en Windows Remote Desktop Gateway (RD Gateway) cuando un atacante no autenticado conecta con el sistema de destino mediante RDP y env\u00eda peticiones especialmente dise\u00f1adas, tambi\u00e9n se conoce como \"Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability\". Este ID de CVE es diferente de CVE-2020-0609."
}
],
"id": "CVE-2020-0610",
"lastModified": "2024-11-21T04:53:51.210",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-01-14T23:15:30.770",
"references": [
{
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0610"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0610"
}
],
"sourceIdentifier": "secure@microsoft.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CNVD-2020-07950
Vulnerability from cnvd - Published: 2020-02-14目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0610
| Name | ['Microsoft Windows Server 2012 R2', 'Microsoft Windows Server 2016', 'Microsoft Windows Server 2012', 'Microsoft Windows Server 2019'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2020-0610"
}
},
"description": "Microsoft Windows Remote Desktop Gateway\u662f\u4e00\u6b3e\u57fa\u4e8eWindows\u7684\u8fdc\u7a0b\u684c\u9762\u7f51\u5173\u3002\n\nMicrosoft Windows Remote Desktop Gateway (RD Gateway)\u4e2d\u5b58\u5728\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u4f7f\u7528RDP\u8fde\u63a5\u5230\u76ee\u6807\u7cfb\u7edf\u5e76\u53d1\u9001\u7279\u5236\u7684\u8bf7\u6c42\u5229\u7528\u8be5\u6f0f\u6d1e\u5728\u76ee\u6807\u7cfb\u7edf\u4e0a\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0610",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2020-07950",
"openTime": "2020-02-14",
"patchDescription": "Microsoft Windows Remote Desktop Gateway\u662f\u4e00\u6b3e\u57fa\u4e8eWindows\u7684\u8fdc\u7a0b\u684c\u9762\u7f51\u5173\u3002\r\n\r\nMicrosoft Windows Remote Desktop Gateway (RD Gateway)\u4e2d\u5b58\u5728\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u4f7f\u7528RDP\u8fde\u63a5\u5230\u76ee\u6807\u7cfb\u7edf\u5e76\u53d1\u9001\u7279\u5236\u7684\u8bf7\u6c42\u5229\u7528\u8be5\u6f0f\u6d1e\u5728\u76ee\u6807\u7cfb\u7edf\u4e0a\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Microsoft Windows Remote Desktop Gateway\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Microsoft Windows Server 2012 R2",
"Microsoft Windows Server 2016",
"Microsoft Windows Server 2012",
"Microsoft Windows Server 2019"
]
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2020-0610",
"serverity": "\u9ad8",
"submitTime": "2020-01-16",
"title": "Microsoft Windows Remote Desktop Gateway\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e"
}
CVE-2020-0610
Vulnerability from csaf_se - Published: 2021-10-12 00:00 - Updated: 2021-10-12 00:00Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "We strongly recommend the following industry cybersecurity best practices.\n\nhttps://www.se.com/us/en/download/document/7EN52-0390/\n* Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.\n* Install physical controls so no unauthorized personnel can access your industrial control and safety systems, components, peripheral equipment, and networks.\n* Place all controllers in locked cabinets and never leave them in the \u201cProgram\u201d mode.\n* Never connect programming software to any network other than the network intended for that device.\n* Scan all methods of mobile data exchange with the isolated network such as CDs, USB drives, etc. before use in the terminals or any node connected to these networks.\n* Never allow mobile devices that have connected to any other network besides the intended network to connect to the safety or control networks without proper sanitation.\n* Minimize network exposure for all control system devices and systems and ensure that they are not accessible from the Internet.\n* When remote access is required, use secure methods, such as Virtual Private Networks (VPNs). Recognize that VPNs may have vulnerabilities and should be updated to the most current version available. Also, understand that VPNs are only as secure as the connected devices.\nFor more information refer to the Schneider Electric Recommended Cybersecurity Best Practices document. \n",
"title": "General Security Recommendations"
},
{
"category": "general",
"text": "This document provides an overview of the identified vulnerability or vulnerabilities and actions required to mitigate. For more details and assistance on how to protect your installation, contact your local Schneider Electric representative or Schneider Electric Industrial Cybersecurity Services: https://www.se.com/ww/en/work/solutions/cybersecurity/. These organizations will be fully aware of this situation and can support you through the process.\nFor further information related to cybersecurity in Schneider Electric\u2019s products, visit the company\u2019s cybersecurity support portal page: https://www.se.com/ww/en/work/support/cybersecurity/overview.jsp",
"title": "For More Information"
},
{
"category": "legal_disclaimer",
"text": "THIS NOTIFICATION DOCUMENT, THE INFORMATION CONTAINED HEREIN, AND ANY MATERIALS LINKED FROM IT (COLLECTIVELY, THIS \u201cNOTIFICATION\u201d) ARE INTENDED TO HELP PROVIDE AN OVERVIEW OF THE IDENTIFIED SITUATION AND SUGGESTED MITIGATION ACTIONS, REMEDIATION, FIX, AND/OR GENERAL SECURITY RECOMMENDATIONS AND IS PROVIDED ON AN \u201cAS-IS\u201d BASIS WITHOUT WARRANTY OR GUARANTEE OF ANY KIND. SCHNEIDER ELECTRIC DISCLAIMS ALL WARRANTIES RELATING TO THIS NOTIFICATION, EITHER EXPRESS OR IMPLIED, INCLUDING WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. SCHNEIDER ELECTRIC MAKES NO WARRANTY THAT THE NOTIFICATION WILL RESOLVE THE IDENTIFIED SITUATION. IN NO EVENT SHALL SCHNEIDER ELECTRIC BE LIABLE FOR ANY DAMAGES OR LOSSES WHATSOEVER IN CONNECTION WITH THIS NOTIFICATION, INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF SCHNEIDER ELECTRIC HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. YOUR USE OF THIS NOTIFICATION IS AT YOUR OWN RISK, AND YOU ARE SOLELY LIABLE FOR ANY DAMAGES TO YOUR SYSTEMS OR ASSETS OR OTHER LOSSES THAT MAY RESULT FROM YOUR USE OF THIS NOTIFICATION. SCHNEIDER ELECTRIC RESERVES THE RIGHT TO UPDATE OR CHANGE THIS NOTIFICATION AT ANY TIME AND IN ITS SOLE DISCRETION",
"title": "LEGAL DISCLAIMER"
},
{
"category": "general",
"text": "At Schneider, we believe access to energy and digital is a basic human right. We empower all to do more with less, ensuring Life Is On everywhere, for everyone, at every moment.\n\nWe provide energy and automation digital solutions for efficiency and sustainability. We combine world-leading energy technologies, real-time automation, software and services into integrated solutions for Homes, Buildings, Data Centers, Infrastructure and Industries.\n\nWe are committed to unleash the infinite possibilities of an open, global, innovative community that is passionate with our Meaningful Purpose, Inclusive and Empowered values.\n\nwww.se.com ",
"title": "About Schneider Electric"
},
{
"category": "summary",
"text": "Schneider Electric is aware of multiple Microsoft Windows vulnerabilities in its Schneider Conext\u2122 Advisor 2 \u0026 Conext\u2122 Control V2 products.\r\nThe Conext\u2122 Advisor 2 is a web portal with an efficient, task-oriented interface for managing and optimizing the performance of solar power plants and includes a complete suite of tools for professional users.\r\nThe Conext\u2122 Control V2 is a Solar Power Plant monitoring solution.\r\nFailure to apply the remediations provided below may risk remote code execution, which could result in undesired behavior within the operating system. An attacker who successfully exploits this vulnerability could execute arbitrary code on the target system and then install programs; view, change, or delete data; or create new accounts with full user rights.",
"title": "Overview"
}
],
"publisher": {
"category": "vendor",
"contact_details": "cpcert@se.com",
"name": "Schneider Electric CPCERT",
"namespace": "https://www.se.com/ww/en/work/support/cybersecurity/security-notifications.jsp"
},
"references": [
{
"category": "self",
"summary": "Conext\u2122 Advisor \u0026 Conext\u2122 Control V2 - SEVD-2021-285-05 PDF Version",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-285-05\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2021-285-05_Conext_Advisor_and_Conext_Control_Security_Notification.pdf"
},
{
"category": "self",
"summary": "Conext\u2122 Advisor \u0026 Conext\u2122 Control V2 - SEVD-2021-285-05 CSAF Version",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-285-05\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=sevd-2021-285-05.json"
},
{
"category": "external",
"summary": "Recommended Cybersecurity Best Practices",
"url": "https://www.se.com/us/en/download/document/7EN52-0390/"
}
],
"title": "Conext\u2122 Advisor \u0026 Conext\u2122 Control V2",
"tracking": {
"current_release_date": "2021-10-12T00:00:00.000Z",
"generator": {
"date": "2021-10-12T00:00:00.00Z",
"engine": {
"name": "Schneider Electric CSAF Generator",
"version": "1.2"
}
},
"id": "SEVD-2021-285-05",
"initial_release_date": "2021-10-12T00:00:00.000Z",
"revision_history": [
{
"date": "2021-10-12T00:00:00.000Z",
"number": "1.0.0",
"summary": "Original Release"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=2.02",
"product": {
"name": "Schneider Electric Conext\u2122 Advisor 2 Cloud 2.02 and below",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "Conext\u2122 Advisor 2 Cloud"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=1.28.45",
"product": {
"name": "Schneider Electric Conext\u2122 Advisor 2 Gateway 1.28.45 and below",
"product_id": "2"
}
}
],
"category": "product_name",
"name": "Conext\u2122 Advisor 2 Gateway"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=2.6",
"product": {
"name": "Schneider Electric Conext\u2122 Control V2 Gateway 2.6 and below",
"product_id": "3"
}
}
],
"category": "product_name",
"name": "Conext\u2122 Control V2 Gateway"
},
{
"branches": [
{
"category": "product_version",
"name": "10",
"product": {
"name": "Schneider Electric Microsoft Windows 10",
"product_id": "4"
}
}
],
"category": "product_name",
"name": "Microsoft Windows"
}
],
"category": "vendor",
"name": "Schneider Electric"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-11135",
"notes": [
{
"category": "description",
"text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"4"
],
"known_affected": [
"1",
"2",
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Version Windows 10 of the Microsoft Windows includes a fix for this vulnerability and is available for download here:\r\n\u2022 https://www.microsoft.com/en-in/software-download/windows10\r\n\u2022 Reboot is required",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "system"
},
"url": "https://www.microsoft.com/en-in/software-download/windows10"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"1",
"2",
"3"
]
}
],
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2020-0601",
"notes": [
{
"category": "description",
"text": "A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates. An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source, aka \u0027Windows CryptoAPI Spoofing Vulnerability\u0027.",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"4"
],
"known_affected": [
"1",
"2",
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Version Windows 10 of the Microsoft Windows includes a fix for this vulnerability and is available for download here:\r\n\u2022 https://www.microsoft.com/en-in/software-download/windows10\r\n\u2022 Reboot is required",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "system"
},
"url": "https://www.microsoft.com/en-in/software-download/windows10"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.1,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 8.1,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"1",
"2",
"3"
]
}
],
"title": "CVE-2020-0601"
},
{
"cve": "CVE-2020-0609",
"notes": [
{
"category": "description",
"text": "A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka \u0027Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability\u0027. This CVE ID is unique from CVE-2020-0610.",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"4"
],
"known_affected": [
"1",
"2",
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Version Windows 10 of the Microsoft Windows includes a fix for this vulnerability and is available for download here:\r\n\u2022 https://www.microsoft.com/en-in/software-download/windows10\r\n\u2022 Reboot is required",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "system"
},
"url": "https://www.microsoft.com/en-in/software-download/windows10"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3"
]
}
],
"title": "CVE-2020-0609"
},
{
"cve": "CVE-2020-0610",
"notes": [
{
"category": "description",
"text": "A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka \u0027Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability\u0027. This CVE ID is unique from CVE-2020-0609.",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"4"
],
"known_affected": [
"1",
"2",
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Version Windows 10 of the Microsoft Windows includes a fix for this vulnerability and is available for download here:\r\n\u2022 https://www.microsoft.com/en-in/software-download/windows10\r\n\u2022 Reboot is required",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "system"
},
"url": "https://www.microsoft.com/en-in/software-download/windows10"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3"
]
}
],
"title": "CVE-2020-0610"
},
{
"cve": "CVE-2020-0796",
"notes": [
{
"category": "description",
"text": "A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka \u0027Windows SMBv3 Client/Server Remote Code Execution Vulnerability\u0027.",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"4"
],
"known_affected": [
"1",
"2",
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Version Windows 10 of the Microsoft Windows includes a fix for this vulnerability and is available for download here:\r\n\u2022 https://www.microsoft.com/en-in/software-download/windows10\r\n\u2022 Reboot is required",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "system"
},
"url": "https://www.microsoft.com/en-in/software-download/windows10"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 10,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3"
]
}
],
"title": "CVE-2020-0796"
},
{
"cve": "CVE-2020-0938",
"notes": [
{
"category": "description",
"text": "A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles a specially-crafted multi-master font - Adobe Type 1 PostScript format. For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely, aka \u0027Adobe Font Manager Library Remote Code Execution Vulnerability\u0027. This CVE ID is unique from CVE-2020-1020.",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"4"
],
"known_affected": [
"1",
"2",
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Version Windows 10 of the Microsoft Windows includes a fix for this vulnerability and is available for download here:\r\n\u2022 https://www.microsoft.com/en-in/software-download/windows10\r\n\u2022 Reboot is required",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "system"
},
"url": "https://www.microsoft.com/en-in/software-download/windows10"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3"
]
}
],
"title": "CVE-2020-0938"
},
{
"cve": "CVE-2020-1020",
"notes": [
{
"category": "description",
"text": "A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles a specially-crafted multi-master font - Adobe Type 1 PostScript format. For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely, aka \u0027Adobe Font Manager Library Remote Code Execution Vulnerability\u0027. This CVE ID is unique from CVE-2020-0938.",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"4"
],
"known_affected": [
"1",
"2",
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Version Windows 10 of the Microsoft Windows includes a fix for this vulnerability and is available for download here:\r\n\u2022 https://www.microsoft.com/en-in/software-download/windows10\r\n\u2022 Reboot is required",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "system"
},
"url": "https://www.microsoft.com/en-in/software-download/windows10"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3"
]
}
],
"title": "CVE-2020-1020"
},
{
"cve": "CVE-2020-1350",
"notes": [
{
"category": "description",
"text": "A remote code execution vulnerability exists in Windows Domain Name System servers when they fail to properly handle requests, aka \u0027Windows DNS Server Remote Code Execution Vulnerability\u0027.",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"4"
],
"known_affected": [
"1",
"2",
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Version Windows 10 of the Microsoft Windows includes a fix for this vulnerability and is available for download here:\r\n\u2022 https://www.microsoft.com/en-in/software-download/windows10\r\n\u2022 Reboot is required",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "system"
},
"url": "https://www.microsoft.com/en-in/software-download/windows10"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 10,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3"
]
}
],
"title": "CVE-2020-1350"
},
{
"cve": "CVE-2020-1472",
"notes": [
{
"category": "description",
"text": "An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC), aka \u0027Netlogon Elevation of Privilege Vulnerability\u0027.",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"4"
],
"known_affected": [
"1",
"2",
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Version Windows 10 of the Microsoft Windows includes a fix for this vulnerability and is available for download here:\r\n\u2022 https://www.microsoft.com/en-in/software-download/windows10\r\n\u2022 Reboot is required",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "system"
},
"url": "https://www.microsoft.com/en-in/software-download/windows10"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 10,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"2",
"3"
]
}
],
"title": "CVE-2020-1472"
},
{
"cve": "CVE-2019-0803",
"notes": [
{
"category": "description",
"text": "An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka \u0027Win32k Elevation of Privilege Vulnerability\u0027. This CVE ID is unique from CVE-2019-0685, CVE-2019-0859.",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"4"
],
"known_affected": [
"1",
"2",
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Version Windows 10 of the Microsoft Windows includes a fix for this vulnerability and is available for download here:\r\n\u2022 https://www.microsoft.com/en-in/software-download/windows10\r\n\u2022 Reboot is required",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "system"
},
"url": "https://www.microsoft.com/en-in/software-download/windows10"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"1",
"2",
"3"
]
}
],
"title": "CVE-2019-0803"
},
{
"cve": "CVE-2019-1040",
"notes": [
{
"category": "description",
"text": "A tampering vulnerability exists in Microsoft Windows when a man-in-the-middle attacker is able to successfully bypass the NTLM MIC (Message Integrity Check) protection, aka \u0027Windows NTLM Tampering Vulnerability\u0027.",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"4"
],
"known_affected": [
"1",
"2",
"3"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Version Windows 10 of the Microsoft Windows includes a fix for this vulnerability and is available for download here:\r\n\u2022 https://www.microsoft.com/en-in/software-download/windows10\r\n\u2022 Reboot is required",
"product_ids": [
"1",
"2",
"3"
],
"restart_required": {
"category": "system"
},
"url": "https://www.microsoft.com/en-in/software-download/windows10"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.9,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.9,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"1",
"2",
"3"
]
}
],
"title": "CVE-2019-1040"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.