Detect date
?
|
03/10/2020 |
Severity
?
|
Critical |
Description
|
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information, execute arbitrary code, spoof user interface, cause denial of service. Below is a complete list of vulnerabilities:
Microsoft is aware of a remote code execution vulnerability in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to execute code on the target SMB Server or SMB Client. To exploit the vulnerability against an SMB Server, an unauthenticated attacker could send a specially crafted packet to a targeted SMBv3 Server. To exploit the vulnerability against an SMB Client, an unauthenticated attacker would need to configure a malicious SMBv3 Server and convince a user to connect to it. |
Exploitation
|
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details. |
Affected products
|
Windows 10 Version 1803 for 32-bit Systems |
Solution
|
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel) |
Original advisories
|
CVE-2020-0810 |
Impacts
?
|
ACE [?] OSI [?] DoS [?] PE [?] SUI [?] |
Related products
|
Microsoft Visual Studio Microsoft Windows Microsoft Windows Server Microsoft Windows Server 2012 Microsoft Windows 8 Microsoft Windows 7 Microsoft Windows Server 2008 Windows RT Microsoft Windows 10 |
CVE-IDS
?
|
CVE-2020-08107.2High
CVE-2020-07934.6Warning CVE-2020-07792.1Warning CVE-2020-08674.6Warning CVE-2020-08147.2High CVE-2020-08592.1Warning CVE-2020-07887.2High CVE-2020-08543.6Warning CVE-2020-08197.2High CVE-2020-08574.6Warning CVE-2020-08347.2High CVE-2020-08534.3Warning CVE-2020-08987.2High CVE-2020-08777.2High CVE-2020-08742.1Warning CVE-2020-08712.1Warning CVE-2020-08696.8High CVE-2020-08587.2High CVE-2020-07877.2High CVE-2020-08497.2High CVE-2020-08967.2High CVE-2020-08792.1Warning CVE-2020-06455.0Critical CVE-2020-07624.6Warning CVE-2020-07634.6Warning CVE-2020-07804.6Warning CVE-2020-07817.2High CVE-2020-07837.2High CVE-2020-08824.3Warning CVE-2020-07853.6Warning CVE-2020-07865.6High CVE-2020-07694.6Warning CVE-2020-08644.6Warning CVE-2020-06846.8High CVE-2020-07744.3Warning CVE-2020-08974.6Warning CVE-2020-08454.6Warning CVE-2020-08079.3Critical CVE-2020-08064.6Warning CVE-2020-08047.2High CVE-2020-08037.2High CVE-2020-08027.2High CVE-2020-08016.9High CVE-2020-08007.2High CVE-2020-08202.1Warning CVE-2020-08224.6Warning CVE-2020-08099.3Critical CVE-2020-08084.6Warning CVE-2020-08657.2High CVE-2020-08424.6Warning CVE-2020-08417.2High CVE-2020-08407.2High CVE-2020-08434.6Warning CVE-2020-08607.2High CVE-2020-08632.1Warning CVE-2020-08444.6Warning CVE-2020-08877.2High CVE-2020-08854.3Warning CVE-2020-08839.3Critical CVE-2020-08684.6Warning CVE-2020-08819.3Critical CVE-2020-08804.3Warning CVE-2020-07752.1Warning CVE-2020-08765.0Critical CVE-2020-07774.6Warning CVE-2020-07764.6Warning CVE-2020-07714.6Warning CVE-2020-07997.2High CVE-2020-07734.6Warning CVE-2020-07987.2High CVE-2020-07977.2High CVE-2020-07724.6Warning CVE-2020-07784.6Warning CVE-2020-07917.2High CVE-2020-08664.6Warning CVE-2020-07704.6Warning CVE-2020-08617.2High |
KB list
|
4538461 |
Microsoft official advisories
|
Microsoft Security Update Guide |
Find out the statistics of the vulnerabilities spreading in your region |