CVE-2020-1464

high

Description

A spoofing vulnerability exists when Windows incorrectly validates file signatures. An attacker who successfully exploited this vulnerability could bypass security features and load improperly signed files. In an attack scenario, an attacker could bypass security features intended to prevent improperly signed files from being loaded. The update addresses the vulnerability by correcting how Windows validates file signatures.

References

https://www.tenable.com/blog/one-year-later-what-can-we-learn-from-zerologon

https://www.tenable.com/blog/microsoft-s-august-2020-patch-tuesday-addresses-120-cves-cve-2020-1337

https://www.tenable.com/blog/microsoft-s-august-2020-patch-tuesday-addresses-120-cves-cve-2020-1337

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1464

https://medium.com/%40TalBeerySec/glueball-the-story-of-cve-2020-1464-50091a1f98bd

https://krebsonsecurity.com/2020/08/microsoft-put-off-fixing-zero-day-for-2-years/

https://blog.virustotal.com/2019/01/distribution-of-malicious-jar-appended.html

Details

Source: Mitre, NVD

Published: 2020-08-17

Updated: 2024-01-19

Risk Information

CVSS v2

Base Score: 2.1

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:P/A:N

Severity: Low

CVSS v3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High