Lucene search

K
nvd[email protected]NVD:CVE-2020-1421
HistoryJul 14, 2020 - 11:15 p.m.

CVE-2020-1421

2020-07-1423:15:18
CWE-843
web.nvd.nist.gov
6
microsoft windows
lnk file
remote code execution

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.095

Percentile

94.8%

A remote code execution vulnerability exists in Microsoft Windows that could allow remote code execution if a .LNK file is processed.An attacker who successfully exploited this vulnerability could gain the same user rights as the local user, aka โ€˜LNK Remote Code Execution Vulnerabilityโ€™.

Affected configurations

Nvd
Node
microsoftwindows_10Match-x64
OR
microsoftwindows_10Match-x86
OR
microsoftwindows_10Match1607x64
OR
microsoftwindows_10Match1607x86
OR
microsoftwindows_10Match1709arm64
OR
microsoftwindows_10Match1709x64
OR
microsoftwindows_10Match1709x86
OR
microsoftwindows_10Match1803arm64
OR
microsoftwindows_10Match1803x64
OR
microsoftwindows_10Match1803x86
OR
microsoftwindows_10Match1809arm64
OR
microsoftwindows_10Match1809x64
OR
microsoftwindows_10Match1809x86
OR
microsoftwindows_10Match1903arm64
OR
microsoftwindows_10Match1903x64
OR
microsoftwindows_10Match1903x86
OR
microsoftwindows_10Match1909arm64
OR
microsoftwindows_10Match1909x64
OR
microsoftwindows_10Match1909x86
OR
microsoftwindows_10Match2004arm64
OR
microsoftwindows_10Match2004x64
OR
microsoftwindows_10Match2004x86
OR
microsoftwindows_server_2016Match-
OR
microsoftwindows_server_2016Match1903
OR
microsoftwindows_server_2016Match1909
OR
microsoftwindows_server_2016Match2004
OR
microsoftwindows_server_2019Match-
VendorProductVersionCPE
microsoftwindows_10-cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*
microsoftwindows_10-cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*
microsoftwindows_101607cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*
microsoftwindows_101607cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*
microsoftwindows_101709cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:arm64:*
microsoftwindows_101709cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:x64:*
microsoftwindows_101709cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:x86:*
microsoftwindows_101803cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:arm64:*
microsoftwindows_101803cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:x64:*
microsoftwindows_101803cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:x86:*
Rows per page:
1-10 of 271

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.095

Percentile

94.8%