CVE-2020-0662
Published Feb 11, 2020
Last updated 3 years ago
Overview
- Description
- A remote code execution vulnerability exists in the way that Windows handles objects in memory, aka 'Windows Remote Code Execution Vulnerability'.
- Source
- secure@microsoft.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 9
- Impact score
- 10
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "084984D5-D241-497B-B118-50C6C1EAD468" }, { "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "897A48D7-FCA1-4560-AFBB-718AF19BA3A2" }, { "criteria": "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "1B3308A0-1699-4A4A-8D6B-AB4E4C825C95" }, { "criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "1981BA0D-0920-40C0-8A6A-5D5A1B221560" }, { "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "6CF580BA-6938-40F6-9D86-F43044A6BACA" }, { "criteria": "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "2487AF09-F003-482A-BD42-31F6AEAA033F" }, { "criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "61F0792D-7587-4297-8EE7-D4DC3A30EE84" }, { "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "7FE8B00B-4F39-4755-A323-8AD71F5E3EBE" }, { "criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "C936FD4F-959C-43B8-9917-E2A0DF4A8793" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CAACE735-003E-4ACB-A82E-C0CF97D7F013" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5B921FDB-8E7D-427E-82BE-4432585080CF" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C253A63F-03AB-41CB-A03A-B2674DEA98AA" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" } ], "operator": "OR" } ] } ]