Kaspersky ID:
KLA12001
Date de la détection:
11/10/2020
Mis à jour:
01/28/2026

Description

Multiple vulnerabilities were found in Microsoft Azure. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, cause denial of service, obtain sensitive information, spoof user interface.

Below is a complete list of vulnerabilities:

  1. An elevation of privilege vulnerability in Azure Sphere can be exploited remotely to gain privileges.
  2. A code execution vulnerability in Azure Sphere can be exploited remotely to execute arbitrary code.
  3. A denial of service vulnerability in Azure Sphere can be exploited remotely to cause denial of service.
  4. An information disclosure vulnerability in Azure Sphere can be exploited remotely to obtain sensitive information.
  5. A tampering vulnerability in Azure Sphere can be exploited remotely to spoof user interface.

Fiches de renseignement originales

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Produits associés

Liste CVE

  • CVE-2020-16989
    high
  • CVE-2020-16987
    critical
  • CVE-2020-16992
    critical
  • CVE-2020-16986
    high
  • CVE-2020-16994
    high
  • CVE-2020-16984
    critical
  • CVE-2020-16985
    high
  • CVE-2020-16991
    high
  • CVE-2020-16990
    high
  • CVE-2020-16993
    high
  • CVE-2020-16981
    high
  • CVE-2020-16982
    high
  • CVE-2020-16970
    critical
  • CVE-2020-16988
    high
  • CVE-2020-16983
    high

Liste KB

En savoir plus

Découvrez les statistiques de la propagation des vulnérabilités dans votre région statistics.securelist.com

Vous avez trouvé une inexactitude dans la description de cette vulnérabilité ? Faites-le nous savoir !
Kaspersky IT Security Calculator:
Calculez le profil de sécurité de votre entreprise
Apprendre encore plus
Kaspersky!
Votre vie en ligne mérite une protection complète!
Apprendre encore plus
Do you want to save your changes?
Your message has been sent successfully.