CVE-2020-1286Improper Input Validation in Microsoft Windows

Severity
8.8HIGHNVD
EPSS
35.3%
top 2.95%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 9
Latest updateMay 24

Description

A remote code execution vulnerability exists when the Windows Shell does not properly validate file paths.An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user, aka 'Windows Shell Remote Code Execution Vulnerability'.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages13 packages

CVEListV5microsoft/windows9 versions+8
NVDmicrosoft/windows4 versions+3
NVDmicrosoft/windows_105 versions+4
CVEListV5microsoft/windows_server2019, 2019 (Core installation), version 1803 (Core Installation)+2

Patches

🔴Vulnerability Details

2
GHSA
GHSA-57wr-v5x3-8qhf: A remote code execution vulnerability exists when the Windows Shell does not properly validate file paths2022-05-24
CVEList
CVE-2020-1286: A remote code execution vulnerability exists when the Windows Shell does not properly validate file paths2020-06-09

📋Vendor Advisories

2
Red Hat
nodejs-url-parse: mishandling certain uses of backslash may lead to confidentiality compromise2021-02-22
Microsoft
Windows Shell Remote Code Execution Vulnerability2020-06-09
CVE-2020-1286 — Improper Input Validation in Microsoft | cvebase