Kaspersky ID:
KLA11662
Detect Date:
02/11/2020
Updated:
06/06/2024

Description

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information, execute arbitrary code, cause denial of service, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. An elevation of privilege vulnerability in Windows can be exploited remotely via specially crafted application to gain privileges.
  2. An elevation of privilege vulnerability in Connected User Experiences and Telemetry Service can be exploited remotely via specially crafted application to gain privileges.
  3. An elevation of privilege vulnerability in Connected Devices Platform Service can be exploited remotely via specially crafted application to gain privileges.
  4. An elevation of privilege vulnerability in Windows Data Sharing Service can be exploited remotely via specially crafted application to gain privileges.
  5. An elevation of privilege vulnerability in Windows User Profile Service can be exploited remotely via specially crafted application to gain privileges.
  6. An elevation of privilege vulnerability in Windows Backup Service can be exploited remotely via specially crafted application to gain privileges.
  7. An elevation of privilege vulnerability in Windows Client License Service can be exploited remotely via specially crafted application to gain privileges.
  8. An information disclosure vulnerability in Windows Modules Installer Service can be exploited remotely via specially crafted application to obtain sensitive information.
  9. A remote code execution vulnerability in LNK can be exploited remotely to execute arbitrary code.
  10. An elevation of privilege vulnerability in Windows Wireless Network Manager can be exploited remotely via specially crafted application to gain privileges.
  11. An information disclosure vulnerability in Windows Network Driver Interface Specification (NDIS) can be exploited remotely via specially crafted application to obtain sensitive information.
  12. An elevation of privilege vulnerability in Windows IME can be exploited remotely via specially crafted application to gain privileges.
  13. An elevation of privilege vulnerability in Win32k can be exploited remotely via specially crafted application to gain privileges.
  14. An information disclosure vulnerability in Microsoft Graphics Components can be exploited remotely via specially crafted file to obtain sensitive information.
  15. A remote code execution vulnerability in Windows can be exploited remotely via specially crafted request to execute arbitrary code.
  16. A denial of service vulnerability in Windows Hyper-V can be exploited remotely via specially crafted application to cause denial of service.
  17. An elevation of privilege vulnerability in Windows Search Indexer can be exploited remotely via specially crafted application to gain privileges.
  18. An elevation of privilege vulnerability in Active Directory can be exploited remotely to gain privileges.
  19. An elevation of privilege vulnerability in Windows Kernel can be exploited remotely via specially crafted application to gain privileges.
  20. A remote code execution vulnerability in Remote Desktop Client can be exploited remotely to execute arbitrary code.
  21. An elevation of privilege vulnerability in Windows Function Discovery Service can be exploited remotely via specially crafted application to gain privileges.
  22. An elevation of privilege vulnerability in Windows Installer can be exploited remotely via specially crafted application to gain privileges.
  23. An elevation of privilege vulnerability in Windows COM Server can be exploited remotely via specially crafted application to gain privileges.
  24. A security feature bypass vulnerability in Microsoft Secure Boot can be exploited remotely via specially crafted application to bypass security restrictions.
  25. A remote code execution vulnerability in Windows Imaging Library can be exploited remotely via specially crafted file to execute arbitrary code.
  26. An elevation of privilege vulnerability in DirectX can be exploited remotely via specially crafted application to gain privileges.
  27. An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely via specially crafted application to gain privileges.
  28. An information disclosure vulnerability in Win32k can be exploited remotely via specially crafted application to obtain sensitive information.
  29. An elevation of privilege vulnerability in Windows Graphics Component can be exploited remotely via specially crafted application to gain privileges.
  30. A denial of service vulnerability in Windows Remote Desktop Protocol (RDP) can be exploited remotely via specially crafted requests to cause denial of service.
  31. An elevation of privilege vulnerability in Windows Error Reporting Manager can be exploited remotely via specially crafted application to gain privileges.
  32. An information disclosure vulnerability in Windows Key Isolation Service can be exploited remotely via specially crafted application to obtain sensitive information.
  33. An elevation of privilege vulnerability in Windows Error Reporting can be exploited remotely via specially crafted application to gain privileges.
  34. A remote code execution vulnerability in Remote Desktop Services can be exploited remotely to execute arbitrary code.
  35. An elevation of privilege vulnerability in Windows SSH can be exploited remotely via specially crafted application to gain privileges.
  36. A memory corruption vulnerability in Media Foundation can be exploited remotely via specially crafted document to execute arbitrary code.
  37. An information disclosure vulnerability in Windows Common Log File System Driver can be exploited remotely via specially crafted application to obtain sensitive information.
  38. An information disclosure vulnerability in Windows GDI can be exploited remotely via specially crafted application to obtain sensitive information.
  39. An information disclosure vulnerability in Windows can be exploited remotely via specially crafted application to obtain sensitive information.
  40. An information disclosure vulnerability in DirectX can be exploited remotely via specially crafted application to obtain sensitive information.

Original advisories

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

CVE list

  • CVE-2020-0739
    critical
  • CVE-2020-0727
    critical
  • CVE-2020-0742
    critical
  • CVE-2020-0659
    critical
  • CVE-2020-0730
    high
  • CVE-2020-0703
    critical
  • CVE-2020-0701
    critical
  • CVE-2020-0728
    high
  • CVE-2020-0729
    critical
  • CVE-2020-0704
    critical
  • CVE-2020-0705
    high
  • CVE-2020-0707
    critical
  • CVE-2020-0722
    critical
  • CVE-2020-0723
    critical
  • CVE-2020-0720
    critical
  • CVE-2020-0721
    critical
  • CVE-2020-0726
    critical
  • CVE-2020-0746
    high
  • CVE-2020-0724
    critical
  • CVE-2020-0725
    critical
  • CVE-2020-0662
    critical
  • CVE-2020-0661
    high
  • CVE-2020-0747
    critical
  • CVE-2020-0667
    critical
  • CVE-2020-0666
    critical
  • CVE-2020-0665
    critical
  • CVE-2020-0740
    critical
  • CVE-2020-0669
    critical
  • CVE-2020-0668
    critical
  • CVE-2020-0734
    critical
  • CVE-2020-0681
    critical
  • CVE-2020-0680
    critical
  • CVE-2020-0683
    critical
  • CVE-2020-0682
    critical
  • CVE-2020-0685
    critical
  • CVE-2020-0672
    critical
  • CVE-2020-0686
    critical
  • CVE-2020-0689
    high
  • CVE-2020-0743
    critical
  • CVE-2020-0708
    critical
  • CVE-2020-0709
    critical
  • CVE-2020-0657
    critical
  • CVE-2020-0719
    critical
  • CVE-2020-0732
    critical
  • CVE-2020-0750
    critical
  • CVE-2020-0717
    high
  • CVE-2020-0716
    high
  • CVE-2020-0715
    critical
  • CVE-2020-0660
    critical
  • CVE-2020-0678
    critical
  • CVE-2020-0679
    critical
  • CVE-2020-0731
    critical
  • CVE-2020-0675
    high
  • CVE-2020-0676
    high
  • CVE-2020-0677
    high
  • CVE-2020-0670
    critical
  • CVE-2020-0671
    critical
  • CVE-2020-0737
    critical
  • CVE-2020-0753
    critical
  • CVE-2020-0752
    critical
  • CVE-2020-0751
    high
  • CVE-2020-0655
    critical
  • CVE-2020-0757
    critical
  • CVE-2020-0756
    high
  • CVE-2020-0755
    high
  • CVE-2020-0738
    critical
  • CVE-2020-0735
    critical
  • CVE-2020-0754
    critical
  • CVE-2020-0792
    critical
  • CVE-2020-0658
    high
  • CVE-2020-0744
    high
  • CVE-2020-0691
    critical
  • CVE-2020-0741
    critical
  • CVE-2020-0748
    high
  • CVE-2020-0698
    high
  • CVE-2020-0745
    critical
  • CVE-2020-0714
    high
  • CVE-2020-0749
    critical
  • CVE-2020-0818
    unknown
  • CVE-2020-0817
    unknown

KB list

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.