Language:
https://support.microsoft.com/en-us/help/4561673/windows-8-1-kb4561673
https://support.microsoft.com/en-us/help/4561666/windows-8-1-kb4561666
Severity: High
ID: 137262
File Name: smb_nt_ms20_jun_4561666.nasl
Version: 1.14
Type: local
Agent: windows
Family: Windows : Microsoft Bulletins
Published: 6/9/2020
Updated: 3/6/2023
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus
Risk Factor: High
Score: 8.9
Risk Factor: High
Base Score: 9.3
Temporal Score: 8.1
Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2020-1299
Risk Factor: High
Base Score: 8.8
Temporal Score: 8.4
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CVSS Score Source: CVE-2020-1317
CPE: cpe:/o:microsoft:windows, cpe:/a:microsoft:edge
Required KB Items: SMB/MS_Bulletin_Checks/Possible
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 6/9/2020
Vulnerability Publication Date: 6/9/2020
CISA Known Exploited Vulnerability Due Dates: 5/3/2022
Core Impact
CVE: CVE-2020-0915, CVE-2020-0916, CVE-2020-0986, CVE-2020-1160, CVE-2020-1194, CVE-2020-1196, CVE-2020-1207, CVE-2020-1208, CVE-2020-1212, CVE-2020-1213, CVE-2020-1214, CVE-2020-1215, CVE-2020-1216, CVE-2020-1219, CVE-2020-1220, CVE-2020-1230, CVE-2020-1231, CVE-2020-1236, CVE-2020-1239, CVE-2020-1246, CVE-2020-1247, CVE-2020-1251, CVE-2020-1253, CVE-2020-1254, CVE-2020-1255, CVE-2020-1260, CVE-2020-1262, CVE-2020-1263, CVE-2020-1269, CVE-2020-1270, CVE-2020-1272, CVE-2020-1281, CVE-2020-1282, CVE-2020-1287, CVE-2020-1291, CVE-2020-1299, CVE-2020-1300, CVE-2020-1301, CVE-2020-1302, CVE-2020-1310, CVE-2020-1311, CVE-2020-1314, CVE-2020-1315, CVE-2020-1317, CVE-2020-1334, CVE-2020-1348