Security Updates for Windows Defender (April 2020)

high Nessus Plugin ID 135719

Synopsis

An antimalware application installed on the remote host is affected by a hard link elevation of privilege vulnerability.

Description

The engine version of Microsoft Windows Defender installed on the remote Windows host is prior to 4.18.2001.112. It is, therefore, affected by a hard link elevation of privilege vulnerability which could allow an attacker who successfully exploited this vulnerability to elevate privileges on the system.

Solution

Enable automatic updates to update the scan engine for the relevant antimalware applications. Refer to Knowledge Base Article 2510781 for information on how to verify that MMPE has been updated.

See Also

http://www.nessus.org/u?5520b9d8

Plugin Details

Severity: High

ID: 135719

File Name: smb_nt_ms20_apr_win_defender.nasl

Version: 1.3

Type: local

Agent: windows

Family: Windows

Published: 4/17/2020

Updated: 5/19/2020

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2020-0835

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows, cpe:/a:microsoft:windows_defender

Required KB Items: SMB/Registry/Enumerated, SMB/svcs

Exploit Ease: No known exploits are available

Patch Publication Date: 4/14/2020

Vulnerability Publication Date: 4/14/2020

Reference Information

CVE: CVE-2020-0835