CVE-2020-1596Use of a Broken or Risky Cryptographic Algorithm in Microsoft Windows 10 Version 1507

Severity
5.3MEDIUMNVD
CNA5.4
EPSS
0.2%
top 60.90%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 11
Latest updateMay 24

Description

A information disclosure vulnerability exists when TLS components use weak hash algorithms. An attacker who successfully exploited this vulnerability could obtain information to further compromise a users's encrypted transmission channel. To exploit the vulnerability, an attacker would have to conduct a man-in-the-middle attack. The update addresses the vulnerability by correcting how TLS components use hash algorithms.

CVSS vector

CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 1.6 | Impact: 3.6

Affected Packages23 packages

CVEListV5microsoft/windows_76.1.0publication
CVEListV5microsoft/windows_8.16.3.0publication
CVEListV5microsoft/windows_server_20126.2.0publication
CVEListV5microsoft/windows_server_201610.0.0publication
CVEListV5microsoft/windows_server_201910.0.0publication

Patches

🔴Vulnerability Details

2
GHSA
GHSA-cm57-v77w-q64x: A information disclosure vulnerability exists when TLS components use weak hash algorithms, aka 'TLS Information Disclosure Vulnerability'2022-05-24
CVEList
TLS Information Disclosure Vulnerability2020-09-11

📋Vendor Advisories

1
Microsoft
TLS Information Disclosure Vulnerability2020-09-08

🕵️Threat Intelligence

2
Trendmicro
September Patch Tuesday Updates Exchange, SharePoint2020-09-09
Trendmicro
September Patch Tuesday Updates Exchange, SharePoint2020-09-09
CVE-2020-1596 — Microsoft vulnerability | cvebase