Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2020-1113


A security feature bypass vulnerability exists in Microsoft Windows when the Task Scheduler service fails to properly verify client connections over RPC, aka 'Windows Task Scheduler Security Feature Bypass Vulnerability'.


Published

2020-05-21T23:15:15.197

Last Modified

2024-11-21T05:09:46.497

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

8.6

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-295

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System microsoft windows_10 - Yes
Operating System microsoft windows_10 - Yes
Operating System microsoft windows_10 1607 Yes
Operating System microsoft windows_10 1607 Yes
Operating System microsoft windows_10 1709 Yes
Operating System microsoft windows_10 1803 Yes
Operating System microsoft windows_10 1809 Yes
Operating System microsoft windows_10 1903 Yes
Operating System microsoft windows_10 1909 Yes
Operating System microsoft windows_7 - Yes
Operating System microsoft windows_7 - Yes
Operating System microsoft windows_8.1 - Yes
Operating System microsoft windows_8.1 - Yes
Operating System microsoft windows_rt_8.1 - Yes
Operating System microsoft windows_server_2008 - Yes
Operating System microsoft windows_server_2008 - Yes
Operating System microsoft windows_server_2008 - Yes
Operating System microsoft windows_server_2012 - Yes
Operating System microsoft windows_server_2012 r2 Yes
Operating System microsoft windows_server_2016 - Yes
Operating System microsoft windows_server_2019 - Yes
Operating System microsoft windows_server_2019 1903 Yes
Operating System microsoft windows_server_2019 1909 Yes

References