CVE-2020-1020

Scores

EPSS

0.882high88.2%
0%20%40%60%80%100%

Percentile: 88.2%

CVSS

8.8high3.x
0246810

CVSS Score: 8.8/10

All CVSS Scores

CVSS 3.x
8.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVSS 2.0
6.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Description

A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles a specially-crafted multi-master font - Adobe Type 1 PostScript format.For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely, aka ‘Adobe Font Manager Library Remote Code Execution Vulnerability’. This CVE ID is unique from CVE-2020-0938.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

msrcnvd

CWEs

CWE-787

Related Vulnerabilities

Exploits

Exploit ID: CVE-2020-1020

Source: github-poc

URL: https://github.com/KaLendsi/CVE-2020-1020

Vulnerable Software (34)

Type: Configuration

Vendor: *

Product: windows_10_1507

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*...

Source: nvd

Type: Configuration

Vendor: *

Product: windows_10_1607

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*...

Source: nvd

Type: Configuration

Vendor: *

Product: windows_10_1709

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*...

Source: nvd

Type: Configuration

Vendor: *

Product: windows_10_1803

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*...

Source: nvd

Type: Configuration

Vendor: *

Product: windows_10_1809

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*...

Source: nvd

Type: Configuration

Vendor: *

Product: windows_10_1903

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*...

Source: nvd

Type: Configuration

Vendor: *

Product: windows_10_1909

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*...

Source: nvd

Type: Configuration

Vendor: *

Product: windows_7

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*...

Source: nvd

Type: Configuration

Vendor: *

Product: windows_8.1

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*...

Source: nvd

Type: Configuration

Vendor: *

Product: windows_rt_8.1

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*...

Source: nvd