8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.9 High
AI Score
Confidence
High
6.5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
0.012 Low
EPSS
Percentile
85.1%
This security update resolves a remote code execution vulnerability that exists in PerformancePoint Services for SharePoint Server if the software does not check the source markup of XML file input. To learn more about the vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2020-1439.
Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft SharePoint Foundation 2013 installed on the computer.
This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.
To get the standalone package for this update, go to the Microsoft Update Catalog website.
You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.
For deployment information about this update, see security update deployment information: July 14, 2020.
This security update replaces previously released security update 4484322.
File name | SHA1 hash | SHA256 hash |
---|---|---|
wssloc2013-kb4484411-fullfile-x64-glb.exe | AA9743E01246FC5123FBE4158C52E63A0BF94E83 | 309E6F7DA237AF6D20B42E930237FBCE2E500C05B7FCAA22F7520905FFB4312A |
File informationDownload the list of files that are included in security update 4484411.
Protect yourself online: Windows Security supportLearn how we guard against cyber threats: Microsoft Security
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.9 High
AI Score
Confidence
High
6.5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
0.012 Low
EPSS
Percentile
85.1%