First published: Tue Jan 14 2020(Updated: )
A remote code execution vulnerability exists when the Microsoft .NET Framework fails to validate input properly, aka '.NET Framework Remote Code Execution Injection Vulnerability'.
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Microsoft .NET Framework | =3.0-sp2 | |
Microsoft Windows Server 2008 Itanium | =sp2 | |
All of | ||
Microsoft .NET Framework | =3.5 | |
Any of | ||
Microsoft Windows 10 | =1607 | |
Microsoft Windows 8.1 | ||
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows Server 2012 x64 | =r2 | |
All of | ||
Any of | ||
Microsoft .NET Framework | =3.5 | |
Microsoft .NET Framework | =4.6.2 | |
Microsoft .NET Framework | =4.7 | |
Microsoft .NET Framework | =4.7.1 | |
Microsoft .NET Framework | =4.7.2 | |
Any of | ||
Microsoft Windows 10 | =1607 | |
Microsoft Windows Server 2016 | ||
All of | ||
Any of | ||
Microsoft .NET Framework | =3.5 | |
Microsoft .NET Framework | =4.7.1 | |
Microsoft .NET Framework | =4.7.2 | |
Microsoft Windows 10 | =1709 | |
All of | ||
Any of | ||
Microsoft .NET Framework | =3.5 | |
Microsoft .NET Framework | =4.7.2 | |
Any of | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | =1803 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows Server 2016 | =1803 | |
Microsoft Windows Server 2019 | ||
All of | ||
Any of | ||
Microsoft .NET Framework | =3.5 | |
Microsoft .NET Framework | =4.8 | |
Any of | ||
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =1903 | |
Microsoft Windows 10 | =1909 | |
Microsoft Windows Server 2016 | =1909 | |
Microsoft Windows Server 2019 | ||
All of | ||
Microsoft .NET Framework | =3.5.1 | |
Any of | ||
Microsoft Windows 7 | =sp1 | |
Microsoft Windows Server 2008 Itanium | =r2-sp1 | |
Microsoft Windows Server 2008 Itanium | =r2-sp1 | |
All of | ||
Microsoft .NET Framework | =4.5.2 | |
Any of | ||
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.1 | ||
Microsoft Windows RT | ||
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Server 2008 Itanium | =r2-sp1 | |
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows Server 2012 x64 | =r2 | |
All of | ||
Microsoft .NET Framework | =4.6 | |
Microsoft Windows Server 2008 Itanium | =sp2 | |
All of | ||
Any of | ||
Microsoft .NET Framework | =4.6.2 | |
Microsoft .NET Framework | =4.7 | |
Microsoft .NET Framework | =4.7.1 | |
Microsoft .NET Framework | =4.7.2 | |
Microsoft Windows 10 | =1607 | |
All of | ||
Any of | ||
Microsoft .NET Framework | =4.6 | |
Microsoft .NET Framework | =4.6.1 | |
Microsoft .NET Framework | =4.6.2 | |
Microsoft .NET Framework | =4.7 | |
Microsoft .NET Framework | =4.7.1 | |
Microsoft .NET Framework | =4.7.2 | |
Any of | ||
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.1 | ||
Microsoft Windows RT | ||
Microsoft Windows Server 2008 Itanium | =r2-sp1 | |
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows Server 2012 x64 | =r2 | |
All of | ||
Microsoft .NET Framework | =4.8 | |
Any of | ||
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =1709 | |
Microsoft Windows 10 | =1803 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.1 | ||
Microsoft Windows RT | ||
Microsoft Windows Server 2008 Itanium | =r2-sp1 | |
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows Server 2012 x64 | =r2 | |
Microsoft Windows Server 2016 | ||
Microsoft .NET Framework | =3.0-sp2 | |
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft .NET Framework | =3.5 | |
Microsoft Windows 10 | =1607 | |
Microsoft Windows 8.1 | ||
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows Server 2012 x64 | =r2 | |
Microsoft .NET Framework | =4.6.2 | |
Microsoft .NET Framework | =4.7 | |
Microsoft .NET Framework | =4.7.1 | |
Microsoft .NET Framework | =4.7.2 | |
Microsoft Windows 10 | =1607 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows 10 | =1709 | |
Microsoft Windows 10 | ||
Microsoft Windows 10 | =1803 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows Server 2016 | =1803 | |
Microsoft Windows Server 2019 | ||
Microsoft .NET Framework | =4.8 | |
Microsoft Windows 10 | =1903 | |
Microsoft Windows 10 | =1909 | |
Microsoft Windows Server 2016 | =1909 | |
Microsoft .NET Framework | =3.5.1 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows Server 2008 Itanium | =r2-sp1 | |
Microsoft Windows Server 2008 Itanium | =r2-sp1 | |
Microsoft .NET Framework | =4.5.2 | |
Microsoft Windows RT | ||
Microsoft .NET Framework | =4.6 | |
Microsoft .NET Framework | =4.6.1 | |
Microsoft .NET Framework | ||
All of | ||
=3.0-sp2 | ||
=sp2 | ||
All of | ||
=3.5 | ||
Any of | ||
=1607 | ||
=r2 | ||
All of | ||
Any of | ||
=3.5 | ||
=4.6.2 | ||
=4.7 | ||
=4.7.1 | ||
=4.7.2 | ||
Any of | ||
=1607 | ||
All of | ||
Any of | ||
=3.5 | ||
=4.7.1 | ||
=4.7.2 | ||
=1709 | ||
All of | ||
Any of | ||
=3.5 | ||
=4.7.2 | ||
Any of | ||
=1803 | ||
=1809 | ||
=1803 | ||
All of | ||
Any of | ||
=3.5 | ||
=4.8 | ||
Any of | ||
=1809 | ||
=1903 | ||
=1909 | ||
=1909 | ||
All of | ||
=3.5.1 | ||
Any of | ||
=sp1 | ||
=r2-sp1 | ||
=r2-sp1 | ||
All of | ||
=4.5.2 | ||
Any of | ||
=sp1 | ||
=sp2 | ||
=r2-sp1 | ||
=r2 | ||
All of | ||
=4.6 | ||
=sp2 | ||
All of | ||
Any of | ||
=4.6.2 | ||
=4.7 | ||
=4.7.1 | ||
=4.7.2 | ||
=1607 | ||
All of | ||
Any of | ||
=4.6 | ||
=4.6.1 | ||
=4.6.2 | ||
=4.7 | ||
=4.7.1 | ||
=4.7.2 | ||
Any of | ||
=sp1 | ||
=r2-sp1 | ||
=r2 | ||
All of | ||
=4.8 | ||
Any of | ||
=1607 | ||
=1709 | ||
=1803 | ||
=sp1 | ||
=r2-sp1 | ||
=r2 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-0646 is a remote code execution vulnerability in the Microsoft .NET Framework.
CVE-2020-0646 has a severity rating of 9.8, which is considered critical.
CVE-2020-0646 allows remote attackers to execute code on systems running Microsoft .NET Framework by exploiting input validation vulnerabilities.
No, Windows Server 2012 is not vulnerable to CVE-2020-0646.
To fix CVE-2020-0646, apply the latest security updates provided by Microsoft.