CVE-2020-0646

critical
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

A remote code execution vulnerability exists when the Microsoft .NET Framework fails to validate input properly, aka '.NET Framework Remote Code Execution Injection Vulnerability'.

References

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0646

http://packetstormsecurity.com/files/156930/SharePoint-Workflows-XOML-Injection.html

Details

Source: MITRE

Published: 2020-01-14

Updated: 2022-01-01

Type: CWE-78

Risk Information

CVSS v2

Base Score: 10

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 10

Severity: HIGH

CVSS v3

Base Score: 9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 3.9

Severity: CRITICAL

Vulnerable Software

Configuration 1

AND

OR

cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*

OR

cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*

Configuration 2

AND

OR

cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*

OR

cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*

cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*

Configuration 3

AND

OR

cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*

cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*

cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*

cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*

cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*

OR

cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*

Configuration 4

AND

OR

cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*

cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*

cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*

OR

cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*

Configuration 5

AND

OR

cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*

cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*

OR

cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*

Configuration 6

AND

OR

cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*

cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*

OR

cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*

Configuration 7

AND

OR

cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*

OR

cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*

cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*

Configuration 8

AND

OR

cpe:2.3:a:microsoft:.net_framework:4.5.2:*:*:*:*:*:*:*

OR

cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*

cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*

Configuration 9

AND

OR

cpe:2.3:a:microsoft:.net_framework:4.6:*:*:*:*:*:*:*

OR

cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*

Configuration 10

AND

OR

cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*

cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*

cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*

cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*

OR

cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*

Configuration 11

AND

OR

cpe:2.3:a:microsoft:.net_framework:4.6:*:*:*:*:*:*:*

cpe:2.3:a:microsoft:.net_framework:4.6.1:*:*:*:*:*:*:*

cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*

cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*

cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*

cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*

OR

cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*

cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*

Configuration 12

AND

OR

cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*

OR

cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*

cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*

Tenable Plugins

View all (10 total)

IDNameProductFamilySeverity
132999Security Updates for Microsoft .NET Framework (January 2020)NessusWindows : Microsoft Bulletins
critical
132866KB4534314: Windows 7 and Windows Server 2008 R2 January 2020 Security UpdateNessusWindows : Microsoft Bulletins
critical
132865KB4534306: Windows 10 January 2020 Security UpdateNessusWindows : Microsoft Bulletins
critical
132864KB4534312: Windows Server 2008 January 2020 Security UpdateNessusWindows : Microsoft Bulletins
critical
132862KB4534293: Windows 10 Version 1803 January 2020 Security UpdateNessusWindows : Microsoft Bulletins
critical
132861KB4534288: Windows Server 2012 January 2020 Security UpdateNessusWindows : Microsoft Bulletins
critical
132860KB4534276: Windows 10 Version 1709 January 2020 Security UpdateNessusWindows : Microsoft Bulletins
critical
132859KB4534273: Windows 10 Version 1809 and Windows Server 2019 January 2020 Security UpdateNessusWindows : Microsoft Bulletins
critical
132858KB4534271: Windows 10 Version 1607 and Windows Server 2016 January 2020 Security UpdateNessusWindows : Microsoft Bulletins
critical
132857KB4528760: Windows 10 Version 1903 and Windows 10 Version 1909 January 2020 Security UpdateNessusWindows : Microsoft Bulletins
critical