CVE-2020-1300Microsoft Windows vulnerability

9 documents7 sources
Severity
8.8HIGHNVD
EPSS
36.5%
top 2.87%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 9
Latest updateMay 24

Description

A remote code execution vulnerability exists when Microsoft Windows fails to properly handle cabinet files.To exploit the vulnerability, an attacker would have to convince a user to either open a specially crafted cabinet file or spoof a network printer and trick a user into installing a malicious cabinet file disguised as a printer driver.The update addresses the vulnerability by correcting how Windows handles cabinet files., aka 'Windows Remote Code Execution Vulnerability'.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages13 packages

CVEListV5microsoft/windows18 versions+17
NVDmicrosoft/windows5 versions+4
NVDmicrosoft/windows_107 versions+6
CVEListV5microsoft/windows_server17 versions+16

Patches

🔴Vulnerability Details

2
GHSA
GHSA-cvm7-68v9-chqf: A remote code execution vulnerability exists when Microsoft Windows fails to properly handle cabinet files2022-05-24
CVEList
CVE-2020-1300: A remote code execution vulnerability exists when Microsoft Windows fails to properly handle cabinet files2020-06-09

🔍Detection Rules

2
Suricata
ET EXPLOIT Potentially Malicious .cab Inbound (CVE-2020-1300)2020-07-10
Elastic
Deprecated - Suspicious PrintSpooler Service Executable File Creation

📋Vendor Advisories

1
Microsoft
Windows Remote Code Execution Vulnerability2020-06-09

🕵️Threat Intelligence

3
Trendmicro
Remote Code Execution Through Microsoft Windows CAB Files2020-07-09
Trendmicro
Remote Code Execution Through Microsoft Windows CAB Files2020-07-09
Trendmicro
Remote Code Execution Through Microsoft Windows CAB Files2020-07-09
CVE-2020-1300 — Microsoft Windows vulnerability | cvebase