8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
8.1 High
AI Score
Confidence
High
6 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:S/C:P/I:P/A:P
0.024 Low
EPSS
Percentile
89.8%
A remote code execution vulnerability exists in Microsoft Dynamics NAV 2013 R2. A user who has the permission to access certain features that requires a call from the Role-Tailored Client that has the dataset structure can start arbitrary shell commands through deserialization.
To learn more about the vulnerability, go to CVE-2020-0905.
The following file is available for download from the Microsoft Download Center:Download the package now
To apply this security update, you must have Microsoft Dynamics NAV 2013 installed.
You may have to restart the computer after you apply this security update.
This security update doesn’t replace other security updates.
For deployment details for this security update, go to the following article in the Microsoft Knowledge Base:Security update deployment information: March 10, 2020
Protect yourself online: Windows Security supportLearn how we guard against cyber threats: Microsoft Security
8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
8.1 High
AI Score
Confidence
High
6 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:S/C:P/I:P/A:P
0.024 Low
EPSS
Percentile
89.8%