Lucene search

K
cve[email protected]CVE-2020-1182
HistoryAug 17, 2020 - 7:15 p.m.

CVE-2020-1182

2020-08-1719:15:14
web.nvd.nist.gov
59
cve-2020-1182
remote code execution
microsoft dynamics 365
finance and operations
nvd

6 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

7.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N

8 High

AI Score

Confidence

High

0.02 Low

EPSS

Percentile

88.8%

A remote code execution vulnerability exists in Microsoft Dynamics 365 for Finance and Operations (on-premises) version 10.0.11. An attacker who successfully exploited this vulnerability could gain remote code execution via server-side script execution on the victim server.
An authenticated attacker with privileges to import and export data could exploit this vulnerability by sending a specially crafted file to a vulnerable Dynamics server.
The security update addresses the vulnerability by correcting how Microsoft Dynamics 365 for Finance and Operations (on-premises) version 10.0.11 handles user input.

Affected configurations

Vulners
NVD
Node
microsoftdynamics_365_business_centralMatch10.0.0for_finance_and_operations
VendorProductVersionCPE
microsoftdynamics_365_business_central10.0.0cpe:2.3:a:microsoft:dynamics_365_business_central:10.0.0:*:*:*:*:for_finance_and_operations:*:*

CNA Affected

[
  {
    "vendor": "Microsoft",
    "product": "Dynamics 365 for Finance and Operations",
    "cpes": [
      "cpe:2.3:a:microsoft:dynamics_365:-:*:*:*:*:finance_and_operations:*:*"
    ],
    "platforms": [
      "Unknown"
    ],
    "versions": [
      {
        "version": "10.0.0",
        "lessThan": "publication",
        "versionType": "custom",
        "status": "affected"
      }
    ]
  }
]

6 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

7.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N

8 High

AI Score

Confidence

High

0.02 Low

EPSS

Percentile

88.8%