First published: Tue Jun 09 2020(Updated: )
A remote code execution vulnerability exists when the Windows Shell does not properly validate file paths.An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user, aka 'Windows Shell Remote Code Execution Vulnerability'.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 10 | =1803 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =1903 | |
Microsoft Windows 10 | =1909 | |
Microsoft Windows 10 | =2004 | |
Microsoft Windows Server 2016 | =1803 | |
Microsoft Windows Server 2016 | =1903 | |
Microsoft Windows Server 2016 | =1909 | |
Microsoft Windows Server 2016 | =2004 | |
Microsoft Windows Server 2019 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1286 has a CVSS base score of 8.8, indicating a high severity level.
To fix CVE-2020-1286, ensure your Windows operating system is updated with the latest security patches from Microsoft.
CVE-2020-1286 affects several versions of Windows 10 and Windows Server 2016, along with Windows Server 2019.
CVE-2020-1286 enables remote code execution attacks, allowing attackers to run arbitrary code in the context of the current user.
If CVE-2020-1286 is successfully exploited, an attacker could take control of the affected system, potentially compromising sensitive data.