BGD e-GOV CIRT project Common Vulnerabilities and Exposures (CVE) Report Issue Date: 23-January-2020 Issue Number:03 Vulnerability Publish Date CSVV CVE ID & Description Patch Application: Microsoft Windows Remote 14-JAN-2020 9.8 CVE-2020-0609 https://portal.msrc. Desktop Gateway CRITICAL CVE-2020-0610 microsoft.com/en- (RD Gateway) A remote code execution vulnerability US/security- Remote Code exists in Windows Remote Desktop guidance/advisory/C Execution Gateway (RD Gateway) when an VE-2020-0609 Vulnerability unauthenticated attacker connects to https://portal.msrc. the target system using RDP and sends microsoft.com/en- specially crafted requests, aka US/security- 'Windows Remote Desktop Gateway guidance/advisory/C (RD Gateway) Remote Code Execution VE-2020-0610 Vulnerability'. .NET Framework 14-JAN-2020 9.8 CVE-2020-0646 https://portal.msrc. Remote Code CRITICAL A remote code execution vulnerability microsoft.com/en- Execution Injection exists when the Microsoft .NET US/security- Vulnerability Framework fails to validate input guidance/advisory/C properly, aka '.NET Framework Remote VE-2020-0646 Code Execution Injection Vulnerability'. Windows CryptoAPI 14-JAN-2020 8.1 CVE-2020-0601 https://portal.msrc. Spoofing High A spoofing vulnerability exists in the microsoft.com/en- Vulnerability way Windows CryptoAPI (Crypt32.dll) US/security- validates Elliptic Curve Cryptography guidance/advisory/C (ECC) certificates. An attacker could VE-2020-0601 exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source, aka 'Windows CryptoAPI Spoofing Vulnerability'. Microsoft Excel 14-JAN-2020 7.8 CVE-2020-0653 https://portal.msrc. Remote Code HIGH CVE-2020-0650 microsoft.com/en- Execution CVE-2020-0651 US/security- Vulnerability A remote code execution vulnerability guidance/advisory/C exists in Microsoft Excel software when VE-2020-0653 the software fails to properly handle CV Scoring Scale 0 0.1-3.9 4-6.9 7-8.9 9-10 (CVSS) None Low Medium High Critical 1 Vulnerability Publish Date CSVV CVE ID & Description Patch objects in memory, aka 'Microsoft https://portal.msrc. Excel Remote Code Execution microsoft.com/en- Vulnerability'. US/security- guidance/advisory/C VE-2020-0650 https://portal.msrc. microsoft.com/en- US/security- guidance/advisory/C VE-2020-0651 Microsoft Office 14-JAN-2020 7.8 CVE-2020-0652 https://portal.msrc. Memory Corruption HIGH A remote code execution vulnerability microsoft.com/en- Vulnerability exists in Microsoft Office software US/security- when the software fails to properly guidance/advisory/C handle objects in memory, aka VE-2020-0652 'Microsoft Office Memory Corruption Vulnerability'. Windows Elevation 14-JAN-2020 7.8 CVE-2020-0644 https://portal.msrc. of Privilege HIGH CVE-2020-0635 microsoft.com/en- Vulnerability An elevation of privilege vulnerability US/security- exists when Microsoft Windows guidance/advisory/C implements predictable memory VE-2020-0644 section names, aka 'Windows Elevation https://portal.msrc. of Privilege Vulnerability'. microsoft.com/en- US/security- guidance/advisory/C VE-2020-0635 Win32k Elevation of 14-JAN-2020 7.8 CVE-2020-0642 https://portal.msrc. Privilege HIGH CVE-2020-0624 microsoft.com/en- Vulnerability An elevation of privilege vulnerability US/security- exists in Windows when the Win32k guidance/advisory/C component fails to properly handle VE-2020-0642 objects in memory, aka 'Win32k https://portal.msrc. Elevation of Privilege Vulnerability'. microsoft.com/en- US/security- guidance/advisory/C VE-2020-0624 Update Notification 14-JAN-2020 7.8 CVE-2020-0638 https://portal.msrc. Manager Elevation HIGH An elevation of privilege vulnerability microsoft.com/en- of Privilege exists in the way the Update US/security- Vulnerability Notification Manager handles files.To guidance/advisory/C exploit this vulnerability, an attacker VE-2020-0638 would first have to gain execution on the victim system, aka 'Update Notification Manager Elevation of Privilege Vulnerability'. CV Scoring Scale 0 0.1-3.9 4-6.9 7-8.9 9-10 (CVSS) None Low Medium High Critical 2 Vulnerability Publish Date CSVV CVE ID & Description Patch Windows Common 14-JAN-2020 7.8 CVE-2020-0634 https://portal.msrc. Log File System HIGH An elevation of privilege vulnerability microsoft.com/en- Driver Elevation of exists when the Windows Common Log US/security- Privilege File System (CLFS) driver improperly guidance/advisory/C Vulnerability handles objects in memory, aka VE-2020-0634 'Windows Common Log File System Driver Elevation of Privilege Vulnerability'. Windows Search 14-JAN-2020 7.8 CVE-2020-0633, CVE-2020-0613, https://portal.msrc. Indexer Elevation of HIGH CVE-2020-0614, CVE-2020-0623, microsoft.com/en- Privilege CVE-2020-0625, CVE-2020-0626, US/security- Vulnerability CVE-2020-0627, CVE-2020-0628, guidance/advisory/C CVE-2020-0629, CVE-2020-0630, VE-2020-0633 CVE-2020-0631, CVE-2020-0632 https://portal.msrc. An elevation of privilege vulnerability microsoft.com/en- exists in the way that the Windows US/security- Search Indexer handles objects in guidance/advisory/C memory, aka 'Windows Search Indexer VE-2020-0613 Elevation of Privilege Vulnerability'. https://portal.msrc. microsoft.com/en- US/security- guidance/advisory/C VE-2020-0614 https://portal.msrc. microsoft.com/en- US/security- guidance/advisory/C VE-2020-0623 https://portal.msrc. microsoft.com/en- US/security- guidance/advisory/C VE-2020-0625 https://portal.msrc. microsoft.com/en- US/security- guidance/advisory/C VE-2020-0626 https://portal.msrc. microsoft.com/en- US/security- guidance/advisory/C VE-2020-0627 https://portal.msrc. microsoft.com/en- US/security- CV Scoring Scale 0 0.1-3.9 4-6.9 7-8.9 9-10 (CVSS) None Low Medium High Critical 3 Vulnerability Publish Date CSVV CVE ID & Description Patch guidance/advisory/C VE-2020-0628 https://portal.msrc. microsoft.com/en- US/security- guidance/advisory/C VE-2020-0629 https://portal.msrc. microsoft.com/en- US/security- guidance/advisory/C VE-2020-0630 https://portal.msrc. microsoft.com/en- US/security- guidance/advisory/C VE-2020-0631 https://portal.msrc. microsoft.com/en- US/security- guidance/advisory/C VE-2020-0632 Internet Explorer 14-JAN-2020 7.5 CVE-2020-0640 https://portal.msrc. Memory Corruption HIGH A remote code execution vulnerability microsoft.com/en- Vulnerability exists when Internet Explorer US/security- improperly accesses objects in guidance/advisory/C memory, aka 'Internet Explorer VE-2020-0640 Memory Corruption Vulnerability'. Application: Citrix Vulnerability in Citrix 27-DEC-2019 9.8 CVE-2019-19781 https://support.citri Application Delivery CRITICAL An issue was discovered in Citrix x.com/article/CTX26 Controller, Citrix Application Delivery Controller (ADC) 7027 Gateway, and Citrix and Gateway 10.5, 11.1, 12.0, 12.1, and SD-WAN WANOP 13.0. They allow Directory Traversal. appliance Authentication 21-OCT-2019 9.8 CVE-2019-18225 https://support.citri Bypass Vulnerability CRITICAL An issue was discovered in Citrix x.com/article/CTX26 in the Management Application Delivery Controller (ADC) 1055 Interface of Citrix and Gateway before 10.5 build 70.8, Application Delivery 11.x before 11.1 build 63.9, 12.0 before Controller and Citrix build 62.10, 12.1 before build 54.16, Gateway and 13.0 before build 41.28. An attacker with management-interface access can bypass authentication to obtain appliance administrative access. These products formerly used the NetScaler brand name. CV Scoring Scale 0 0.1-3.9 4-6.9 7-8.9 9-10 (CVSS) None Low Medium High Critical 4 Vulnerability Publish Date CSVV CVE ID & Description Patch Application: Cisco Cisco Data Center 02-JAN-2020 9.8 CVE-2019-15975 https://tools.cisco.c Network Manager CRITICAL CVE-2019-15976 om/security/center/ Authentication CVE-2019-15977 content/CiscoSecuri Bypass Multiple vulnerabilities in the tyAdvisory/cisco-sa- Vulnerabilities authentication mechanisms of Cisco 20200102-dcnm- Data Center Network Manager (DCNM) auth-bypass could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions with administrative privileges on an affected device. Cisco Data Center 02-JAN-2020 7.2 CVE-2019-15978 https://tools.cisco.c Network Manager High CVE-2019-15979 om/security/center/ Command Injection Multiple vulnerabilities in the REST and content/CiscoSecuri Vulnerabilities SOAP API endpoints of Cisco Data tyAdvisory/cisco-sa- Center Network Manager (DCNM) 20200102-dcnm- could allow an authenticated, remote comm-inject attacker with administrative privileges on the DCNM application to inject arbitrary commands on the underlying operating system (OS). Cisco Data Center 02-JAN-2020 7.2 CVE-2019-15984 https://tools.cisco.c Network Manager High CVE-2019-15985 om/security/center/ SQL Injection Multiple vulnerabilities in the REST and content/CiscoSecuri Vulnerabilities SOAP API endpoints of Cisco Data tyAdvisory/cisco-sa- Center Network Manager (DCNM) 20200102-dcnm-sql- could allow an authenticated, remote inject attacker to execute arbitrary SQL commands on an affected device. To exploit these vulnerabilities, an attacker would need administrative privileges on the DCNM application. Cisco Data Center 02-JAN-2020 7.2 CVE-2019-15980 https://tools.cisco.c Network Manager High CVE-2019-15981 om/security/center/ Path Traversal CVE-2019-15982 content/CiscoSecuri Vulnerabilities Multiple vulnerabilities in the REST and tyAdvisory/cisco-sa- SOAP API endpoints and the 20200102-dcnm- Application Framework feature of path-trav Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to conduct directory traversal attacks on an affected device. To exploit these vulnerabilities, an CV Scoring Scale 0 0.1-3.9 4-6.9 7-8.9 9-10 (CVSS) None Low Medium High Critical 5 Vulnerability Publish Date CSVV CVE ID & Description Patch attacker would need administrative privileges on the DCNM application. Application: Apache Apache cordova- 14-JAN-2020 9.8 CVE-2019-0219 https://lists.apache.
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages15 Page
-
File Size-