logo
DATABASE RESOURCES PRICING ABOUT US

KLA12024 Multiple vulnerabilities in Microsoft Windows

Description

### *Detect date*: 12/08/2020 ### *Severity*: Critical ### *Description*: Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information, bypass security restrictions, execute arbitrary code. ### *Affected products*: Windows Server, version 2004 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2012 Windows Server 2012 R2 (Server Core installation) Windows Server, version 1909 (Server Core installation) Windows 10 Version 1607 for 32-bit Systems Windows Server 2016 Windows Server 2019 (Server Core installation) Windows 10 Version 20H2 for 32-bit Systems Windows 7 for 32-bit Systems Service Pack 1 Windows 10 Version 20H2 for ARM64-based Systems Windows 10 Version 2004 for 32-bit Systems Windows 10 Version 1809 for x64-based Systems Windows 8.1 for 32-bit systems Windows 10 for x64-based Systems Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows 10 Version 20H2 for x64-based Systems Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows 10 Version 1903 for x64-based Systems Windows 10 Version 1909 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems Windows 10 Version 1903 for ARM64-based Systems Windows 10 Version 1909 for ARM64-based Systems Windows 10 Version 1809 for ARM64-based Systems Windows 10 Version 1607 for x64-based Systems Windows 7 for x64-based Systems Service Pack 1 Windows RT 8.1 Windows 10 Version 1803 for 32-bit Systems Windows Server 2016 (Server Core installation) Windows Server 2012 (Server Core installation) Windows Server 2019 Windows 10 Version 1909 for 32-bit Systems Windows 8.1 for x64-based systems Windows 10 Version 2004 for ARM64-based Systems Windows 10 Version 1903 for 32-bit Systems Windows 10 for 32-bit Systems Windows 10 Version 2004 for x64-based Systems Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2012 R2 Windows Server, version 1903 (Server Core installation) Windows 10 Version 1803 for ARM64-based Systems Windows 10 Version 1803 for x64-based Systems Windows Server, version 20H2 (Server Core Installation) ### *Solution*: Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel) ### *Original advisories*: [CVE-2020-17103](<https://nvd.nist.gov/vuln/detail/CVE-2020-17103>) [CVE-2020-16964](<https://nvd.nist.gov/vuln/detail/CVE-2020-16964>) [CVE-2020-16960](<https://nvd.nist.gov/vuln/detail/CVE-2020-16960>) [CVE-2020-17140](<https://nvd.nist.gov/vuln/detail/CVE-2020-17140>) [CVE-2020-16962](<https://nvd.nist.gov/vuln/detail/CVE-2020-16962>) [CVE-2020-16963](<https://nvd.nist.gov/vuln/detail/CVE-2020-16963>) [CVE-2020-16961](<https://nvd.nist.gov/vuln/detail/CVE-2020-16961>) [CVE-2020-17099](<https://nvd.nist.gov/vuln/detail/CVE-2020-17099>) [CVE-2020-17098](<https://nvd.nist.gov/vuln/detail/CVE-2020-17098>) [CVE-2020-17097](<https://nvd.nist.gov/vuln/detail/CVE-2020-17097>) [CVE-2020-17096](<https://nvd.nist.gov/vuln/detail/CVE-2020-17096>) [CVE-2020-17095](<https://nvd.nist.gov/vuln/detail/CVE-2020-17095>) [CVE-2020-17094](<https://nvd.nist.gov/vuln/detail/CVE-2020-17094>) [CVE-2020-17092](<https://nvd.nist.gov/vuln/detail/CVE-2020-17092>) [CVE-2020-17138](<https://nvd.nist.gov/vuln/detail/CVE-2020-17138>) [CVE-2020-17139](<https://nvd.nist.gov/vuln/detail/CVE-2020-17139>) [CVE-2020-17134](<https://nvd.nist.gov/vuln/detail/CVE-2020-17134>) [CVE-2020-17136](<https://nvd.nist.gov/vuln/detail/CVE-2020-17136>) [CVE-2020-17137](<https://nvd.nist.gov/vuln/detail/CVE-2020-17137>) [CVE-2020-16996](<https://nvd.nist.gov/vuln/detail/CVE-2020-16996>) [CVE-2020-16959](<https://nvd.nist.gov/vuln/detail/CVE-2020-16959>) [CVE-2020-16958](<https://nvd.nist.gov/vuln/detail/CVE-2020-16958>) [ADV200013](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/ADV200013>) ### *Impacts*: ACE ### *Related products*: [Microsoft Windows](<https://threats.kaspersky.com/en/product/Microsoft-Windows/>) ### *CVE-IDS*: [CVE-2020-17103](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17103>)7.2High [CVE-2020-16964](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16964>)7.2High [CVE-2020-16960](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16960>)7.2High [CVE-2020-17140](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17140>)4.0Warning [CVE-2020-16962](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16962>)7.2High [CVE-2020-16963](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16963>)7.2High [CVE-2020-16961](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16961>)7.2High [CVE-2020-17099](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17099>)4.6Warning [CVE-2020-17098](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17098>)2.1Warning [CVE-2020-17097](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17097>)4.6Warning [CVE-2020-17096](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17096>)9.0Critical [CVE-2020-17095](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17095>)9.0Critical [CVE-2020-17094](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17094>)2.1Warning [CVE-2020-17092](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17092>)7.2High [CVE-2020-17138](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17138>)2.1Warning [CVE-2020-17139](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17139>)4.6Warning [CVE-2020-17134](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17134>)4.6Warning [CVE-2020-17136](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17136>)4.6Warning [CVE-2020-17137](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17137>)4.6Warning [CVE-2020-16996](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16996>)4.0Warning [CVE-2020-16959](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16959>)7.2High [CVE-2020-16958](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16958>)7.2High ### *KB list*: [4592449](<http://support.microsoft.com/kb/4592449>) [4592440](<http://support.microsoft.com/kb/4592440>) [4592438](<http://support.microsoft.com/kb/4592438>) [4592484](<http://support.microsoft.com/kb/4592484>) [4593226](<http://support.microsoft.com/kb/4593226>) [4592495](<http://support.microsoft.com/kb/4592495>) [4592497](<http://support.microsoft.com/kb/4592497>) [4592446](<http://support.microsoft.com/kb/4592446>) [4592464](<http://support.microsoft.com/kb/4592464>) [4592468](<http://support.microsoft.com/kb/4592468>) [5000822](<http://support.microsoft.com/kb/5000822>) [5000847](<http://support.microsoft.com/kb/5000847>) [5000808](<http://support.microsoft.com/kb/5000808>) [5000803](<http://support.microsoft.com/kb/5000803>) [5000848](<http://support.microsoft.com/kb/5000848>) [5000802](<http://support.microsoft.com/kb/5000802>) [5000853](<http://support.microsoft.com/kb/5000853>) [5000840](<http://support.microsoft.com/kb/5000840>) ### *Microsoft official advisories*:


Related