A spoofing vulnerability exists when Windows incorrectly validates file signatures. An attacker who successfully exploited this vulnerability could bypass security features and load improperly signed files.
In an attack scenario, an attacker could bypass security features intended to prevent improperly signed files from being loaded.
The update addresses the vulnerability by correcting how Windows validates file signatures.
References
Link | Resource |
---|---|
https://blog.virustotal.com/2019/01/distribution-of-malicious-jar-appended.html | Third Party Advisory |
https://krebsonsecurity.com/2020/08/microsoft-put-off-fixing-zero-day-for-2-years/ | Issue Tracking Third Party Advisory |
https://medium.com/%40TalBeerySec/glueball-the-story-of-cve-2020-1464-50091a1f98bd | Exploit Third Party Advisory |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1464 | Patch Vendor Advisory |
https://blog.virustotal.com/2019/01/distribution-of-malicious-jar-appended.html | Third Party Advisory |
https://krebsonsecurity.com/2020/08/microsoft-put-off-fixing-zero-day-for-2-years/ | Issue Tracking Third Party Advisory |
https://medium.com/%40TalBeerySec/glueball-the-story-of-cve-2020-1464-50091a1f98bd | Exploit Third Party Advisory |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1464 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:10
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.virustotal.com/2019/01/distribution-of-malicious-jar-appended.html - Third Party Advisory | |
References | () https://krebsonsecurity.com/2020/08/microsoft-put-off-fixing-zero-day-for-2-years/ - Issue Tracking, Third Party Advisory | |
References | () https://medium.com/%40TalBeerySec/glueball-the-story-of-cve-2020-1464-50091a1f98bd - Exploit, Third Party Advisory | |
References | () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1464 - Patch, Vendor Advisory |
26 Jul 2024, 19:55
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:* |
cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2004:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_1909:-:*:*:*:*:*:*:* |
References | () https://krebsonsecurity.com/2020/08/microsoft-put-off-fixing-zero-day-for-2-years/ - Issue Tracking, Third Party Advisory | |
References | () https://medium.com/%40TalBeerySec/glueball-the-story-of-cve-2020-1464-50091a1f98bd - Exploit, Third Party Advisory | |
First Time |
Microsoft windows 10 2004
Microsoft windows 10 1809 Microsoft windows 10 1709 Microsoft windows Server 2004 Microsoft windows 10 1803 Microsoft windows 10 1507 Microsoft windows 10 1909 Microsoft windows Server 1909 Microsoft windows 10 1903 Microsoft windows Server 1903 Microsoft windows 10 1607 |
19 Jan 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
Summary | A spoofing vulnerability exists when Windows incorrectly validates file signatures. An attacker who successfully exploited this vulnerability could bypass security features and load improperly signed files. In an attack scenario, an attacker could bypass security features intended to prevent improperly signed files from being loaded. The update addresses the vulnerability by correcting how Windows validates file signatures. |
04 Jan 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
Summary | <p>A spoofing vulnerability exists when Windows incorrectly validates file signatures. An attacker who successfully exploited this vulnerability could bypass security features and load improperly signed files.</p> <p>In an attack scenario, an attacker could bypass security features intended to prevent improperly signed files from being loaded.</p> <p>The update addresses the vulnerability by correcting how Windows validates file signatures.</p> | |
CVSS |
v2 : v3 : |
v2 : 2.1
v3 : 7.8 |
07 Nov 2023, 03:19
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2020-08-17 19:15
Updated : 2024-11-21 05:10
NVD link : CVE-2020-1464
Mitre link : CVE-2020-1464
CVE.ORG link : CVE-2020-1464
JSON object : View
Products Affected
microsoft
- windows_10_1709
- windows_10_2004
- windows_10_1507
- windows_7
- windows_10_1909
- windows_server_2004
- windows_8.1
- windows_rt_8.1
- windows_server_1903
- windows_10_1903
- windows_10_1809
- windows_10_1607
- windows_server_2016
- windows_server_2019
- windows_server_2012
- windows_server_2008
- windows_server_1909
- windows_10_1803
CWE
CWE-347
Improper Verification of Cryptographic Signature