CVE-2020-0951

Severity
6.7MEDIUM
EPSS
0.5%
top 32.61%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 11
Latest updateMay 24

Description

A security feature bypass vulnerability exists in Windows Defender Application Control (WDAC) which could allow an attacker to bypass WDAC enforcement. An attacker who successfully exploited this vulnerability could execute PowerShell commands that would be blocked by WDAC. To exploit the vulnerability, an attacker need administrator access on a local machine where PowerShell is running. The attacker could then connect to a PowerShell session and send commands to execute arbitrary code. The upda

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 0.8 | Impact: 5.9

Affected Packages20 packages

NVDmicrosoft/powershell7.07.0.8+2
CVEListV5microsoft/powershell_7.07.0.07.0.8
CVEListV5microsoft/powershell_7.17.1.07.1.5
CVEListV5microsoft/windows_server_201610.0.0publication
CVEListV5microsoft/windows_server_201910.0.0publication

Patches

🔴Vulnerability Details

2
GHSA
GHSA-72c6-539v-q92f: A security feature bypass vulnerability exists in Windows Defender Application Control (WDAC) which could allow an attacker to bypass WDAC enforcement2022-05-24
CVEList
Windows Defender Application Control Security Feature Bypass Vulnerability2020-09-11

📋Vendor Advisories

1
Microsoft
Windows Defender Application Control Security Feature Bypass Vulnerability2020-09-08
CVE-2020-0951 (MEDIUM CVSS 6.7) | A security feature bypass vulnerabi | cvebase.io