Kaspersky ID:
KLA11744
Detect Date:
04/14/2020
Updated:
01/28/2026

Description

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code, gain privileges, cause denial of service, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. An information disclosure vulnerability in Microsoft Graphics Component can be exploited remotely via specially crafted application to obtain sensitive information.
  2. A remote code execution vulnerability in Jet Database Engine can be exploited remotely via specially crafted file to execute arbitrary code.
  3. An information disclosure vulnerability in Win32k can be exploited remotely via specially crafted application to obtain sensitive information.
  4. An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
  5. A remote code execution vulnerability in GDI+ can be exploited remotely via specially crafted website to execute arbitrary code.
  6. A remote code execution vulnerability in Microsoft Windows Codecs Library can be exploited remotely via specially crafted image to execute arbitrary code.
  7. An elevation of privilege vulnerability in Windows can be exploited remotely via specially crafted application to gain privileges.
  8. An elevation of privilege vulnerability in Microsoft Windows Update Client can be exploited remotely via specially crafted application to gain privileges.
  9. An information disclosure vulnerability in Media Foundation can be exploited remotely via specially crafted file to obtain sensitive information.
  10. A remote code execution vulnerability in Microsoft Graphics Components can be exploited remotely via specially crafted file to execute arbitrary code.
  11. An elevation of privilege vulnerability in Windows Work Folder Service can be exploited remotely via specially crafted application to gain privileges.
  12. A remote code execution vulnerability in Microsoft Graphics can be exploited remotely via specially crafted embedded to execute arbitrary code.
  13. A denial of service vulnerability in Windows DNS can be exploited remotely to cause denial of service.
  14. An elevation of privilege vulnerability in Windows Kernel can be exploited remotely via specially crafted application to gain privileges.
  15. An information disclosure vulnerability in Windows GDI can be exploited remotely via specially crafted document to obtain sensitive information.
  16. An elevation of privilege vulnerability in Windows Graphics Component can be exploited remotely via specially crafted application to gain privileges.
  17. An elevation of privilege vulnerability in Win32k can be exploited remotely via specially crafted application to gain privileges.
  18. A remote code execution vulnerability in Adobe Font Manager Library can be exploited remotely via specially crafted document to execute arbitrary code.
  19. An information disclosure in CPU Memory Access can be exploited remotely via specially crafted application to obtain sensitive information.
  20. An elevation of privilege vulnerability in Windows Update Stack can be exploited remotely via specially crafted application to gain privileges.
  21. An elevation of privilege vulnerability in Windows can be exploited remotely via specially crafted script to gain privileges.
  22. A security feature bypass vulnerability in Windows Token can be exploited remotely to bypass security restrictions.
  23. An elevation of privilege vulnerability in Connected User Experiences and Telemetry Service can be exploited remotely via specially crafted application to gain privileges.
  24. A memory corruption vulnerability in Media Foundation can be exploited remotely via specially crafted document to execute arbitrary code.
  25. An elevation of privilege vulnerability in DirectX can be exploited remotely via specially crafted application to gain privileges.
  26. A remote code execution vulnerability in Windows Hyper-V can be exploited remotely via specially crafted application to execute arbitrary code.
  27. An elevation of privilege vulnerability in Windows Hyper-V can be exploited remotely to gain privileges.
  28. An elevation of privilege vulnerability in Windows Push Notification Service can be exploited remotely via specially crafted application to gain privileges.
  29. An elevation of privilege vulnerability in Windows Scheduled Task can be exploited remotely via specially crafted application to gain privileges.
  30. An information disclosure vulnerability in Windows Push Notification Service can be exploited remotely via specially crafted application to obtain sensitive information.
  31. A denial of service vulnerability in Windows can be exploited remotely via specially crafted application to cause denial of service.

Original advisories

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

CVE list

  • CVE-2020-0987
    high
  • CVE-2020-0982
    high
  • CVE-2020-0889
    critical
  • CVE-2020-0960
    critical
  • CVE-2020-0962
    high
  • CVE-2020-1007
    high
  • CVE-2020-0964
    critical
  • CVE-2020-0965
    critical
  • CVE-2020-0988
    critical
  • CVE-2020-0959
    critical
  • CVE-2020-1015
    critical
  • CVE-2020-1014
    critical
  • CVE-2020-0946
    high
  • CVE-2020-1011
    critical
  • CVE-2020-1009
    critical
  • CVE-2020-0907
    critical
  • CVE-2020-1094
    critical
  • CVE-2020-0687
    critical
  • CVE-2020-0995
    critical
  • CVE-2020-0994
    critical
  • CVE-2020-0993
    high
  • CVE-2020-0992
    critical
  • CVE-2020-0821
    high
  • CVE-2020-0999
    critical
  • CVE-2020-1000
    critical
  • CVE-2020-0953
    critical
  • CVE-2020-0952
    high
  • CVE-2020-1004
    critical
  • CVE-2020-1005
    high
  • CVE-2020-0956
    critical
  • CVE-2020-1008
    critical
  • CVE-2020-0958
    critical
  • CVE-2020-1020
    critical
  • CVE-2020-1027
    critical
  • CVE-2020-0938
    critical
  • CVE-2020-0955
    high
  • CVE-2020-0985
    critical
  • CVE-2020-0983
    critical
  • CVE-2020-0981
    critical
  • CVE-2020-0942
    high
  • CVE-2020-0947
    high
  • CVE-2020-0948
    critical
  • CVE-2020-0949
    critical
  • CVE-2020-0945
    high
  • CVE-2020-0784
    critical
  • CVE-2020-0910
    critical
  • CVE-2020-1003
    critical
  • CVE-2020-0913
    critical
  • CVE-2020-1029
    critical
  • CVE-2020-0944
    critical
  • CVE-2020-0996
    critical
  • CVE-2020-0950
    critical
  • CVE-2020-0939
    high
  • CVE-2020-0918
    high
  • CVE-2020-1006
    critical
  • CVE-2020-0888
    critical
  • CVE-2020-0917
    high
  • CVE-2020-0937
    high
  • CVE-2020-0936
    high
  • CVE-2020-0934
    critical
  • CVE-2020-1017
    critical
  • CVE-2020-1016
    high
  • CVE-2020-0794
    high
  • CVE-2020-0940
    critical
  • CVE-2020-1001
    critical
  • CVE-2020-0699
    high

KB list

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Do you want to save your changes?
Your message has been sent successfully.