Detect date
?
|
08/11/2020 |
Severity
?
|
Critical |
Description
|
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, , obtain sensitive information, spoof user interface, cause denial of service. Below is a complete list of vulnerabilities:
|
Exploitation
|
The following public exploits exists for this vulnerability: https://github.com/Tobey123/CVE-2020-1472-visualizer https://github.com/SecuraBV/CVE-2020-1472 https://github.com/cube0x0/CVE-2020-1472 https://github.com/dirkjanm/CVE-2020-1472 https://github.com/VoidSec/CVE-2020-1472 https://github.com/risksense/zerologon https://github.com/bb00/zer0dump https://github.com/0xkami/CVE-2020-1472 https://github.com/NAXG/CVE-2020-1472 https://github.com/s0wr0b1ndef/CVE-2020-1472 https://github.com/harshil-shah004/zerologon-CVE-2020-1472 https://github.com/k8gege/CVE-2020-1472-EXP https://github.com/422926799/CVE-2020-1472 https://github.com/scv-m/zabbix-template-CVE-2020-1472 https://github.com/mstxq17/cve-2020-1472 https://github.com/Fa1c0n35/CVE-2020-1472 https://github.com/Fa1c0n35/SecuraBV-CVE-2020-1472 https://github.com/CanciuCostin/CVE-2020-1472 https://github.com/0xcccc666/cve-2020-1472_Tool-collection https://github.com/murataydemir/CVE-2020-1472 https://github.com/npocmak/CVE-2020-1472 https://github.com/victim10wq3/CVE-2020-1472 https://github.com/zeronetworks/zerologon https://github.com/sv3nbeast/CVE-2020-1472 https://github.com/midpipps/CVE-2020-1472-Easy https://github.com/hectorgie/CVE-2020-1472 https://github.com/johnpathe/zerologon-cve-2020-1472-notes https://github.com/t31m0/CVE-2020-1472 https://github.com/grupooruss/CVE-2020-1472 https://github.com/striveben/CVE-2020-1472 https://github.com/Fa1c0n35/CVE-2020-1472-02- https://github.com/Whippet0/CVE-2020-1472 https://github.com/WiIs0n/Zerologon_CVE-2020-1472 https://github.com/Privia-Security/ADZero https://github.com/Ken-Abruzzi/cve-2020-1472 https://github.com/rhymeswithmogul/Set-ZerologonMitigation https://github.com/shanfenglan/cve-2020-1472 https://github.com/maikelnight/zerologon https://github.com/CPO-EH/CVE-2020-1472_ZeroLogonChecker https://github.com/puckiestyle/CVE-2020-1472 https://github.com/mingchen-script/CVE-2020-1472-visualizer https://github.com/JayP232/The_big_Zero https://github.com/b1ack0wl/CVE-2020-1472 https://github.com/SaharAttackit/CVE-2020-1472 https://github.com/wrathfulDiety/zerologon https://github.com/YossiSassi/ZeroLogon-Exploitation-Check https://github.com/sho-luv/zerologon https://github.com/hell-moon/ZeroLogon-Exploit https://github.com/Udyz/Zerologon https://github.com/itssmikefm/CVE-2020-1472 https://github.com/NickSanzotta/zeroscan Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details. |
Affected products
|
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) |
Solution
|
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel) |
Original advisories
|
CVE-2020-1492 |
Impacts
?
|
ACE [?] OSI [?] DoS [?] SB [?] PE [?] SUI [?] |
Related products
|
Microsoft Windows Microsoft Windows Server Microsoft Windows Server 2012 Microsoft Windows 8 Microsoft Windows 7 Microsoft Windows Server 2008 Windows RT Microsoft Windows 10 |
CVE-IDS
?
|
CVE-2020-14884.6Warning
CVE-2020-13796.8High CVE-2020-15374.6Warning CVE-2020-13832.1Warning CVE-2020-14754.6Warning CVE-2020-15454.6Warning CVE-2020-15797.2High CVE-2020-14704.6Warning CVE-2020-15364.6Warning CVE-2020-15774.3Warning CVE-2020-15526.8High CVE-2020-15354.6Warning CVE-2020-14736.8High CVE-2020-15514.6Warning CVE-2020-15304.6Warning CVE-2020-14742.1Warning CVE-2020-15184.6Warning CVE-2020-15194.6Warning CVE-2020-15164.6Warning CVE-2020-14786.8High CVE-2020-15589.3Critical CVE-2020-15154.6Warning CVE-2020-15384.6Warning CVE-2020-15394.6Warning CVE-2020-15579.3Critical CVE-2020-15546.8High CVE-2020-14729.3Critical CVE-2020-15174.6Warning CVE-2020-14844.6Warning CVE-2020-14852.1Warning CVE-2020-14867.2High CVE-2020-15444.6Warning CVE-2020-15297.2High CVE-2020-15847.2High CVE-2020-15877.2High CVE-2020-13777.2High CVE-2020-14776.8High CVE-2020-13399.3Critical CVE-2020-13377.2High CVE-2020-13787.2High CVE-2020-15649.3Critical CVE-2020-15629.3Critical CVE-2020-15134.6Warning CVE-2020-15414.6Warning CVE-2020-15404.6Warning CVE-2020-15434.6Warning CVE-2020-15424.6Warning CVE-2020-15346.8High CVE-2020-14677.2High CVE-2020-14642.1Warning CVE-2020-15464.6Warning CVE-2020-15474.6Warning CVE-2020-15207.2High CVE-2020-14894.6Warning CVE-2020-14926.8High CVE-2020-14904.6Warning CVE-2020-15534.6Warning CVE-2020-15507.2High CVE-2020-15564.6Warning CVE-2020-14177.2High CVE-2020-14874.3Warning CVE-2020-14807.2High CVE-2020-15667.2High CVE-2020-15654.6Warning CVE-2020-15619.3Critical CVE-2020-15606.9High CVE-2020-15781.9Warning CVE-2020-15717.2High CVE-2020-15746.9High CVE-2020-14797.2High CVE-2020-15856.8High CVE-2020-15096.5High CVE-2020-14592.1Warning CVE-2020-15124.3Warning CVE-2020-15104.3Warning CVE-2020-15114.6Warning CVE-2020-15286.8High CVE-2020-15224.6Warning CVE-2020-15214.6Warning CVE-2020-15274.6Warning CVE-2020-15264.6Warning CVE-2020-15256.8High CVE-2020-15244.6Warning CVE-2020-15316.8High CVE-2020-15334.6Warning CVE-2020-14665.0Critical CVE-2020-15497.2High CVE-2020-15482.1Warning |
KB list
|
4571692 |
Microsoft official advisories
|
Microsoft Security Update Guide |
Find out the statistics of the vulnerabilities spreading in your region |