Language:
https://support.microsoft.com/en-us/help/4571729/windows-7-update
https://support.microsoft.com/en-us/help/4571719/windows-7-update
Severity: Critical
ID: 139491
File Name: smb_nt_ms20_aug_4571729.nasl
Version: 1.24
Type: local
Agent: windows
Family: Windows : Microsoft Bulletins
Published: 8/11/2020
Updated: 6/17/2024
Supported Sensors: Nessus
Risk Factor: Critical
Score: 9.0
Risk Factor: High
Base Score: 9.3
Temporal Score: 8.1
Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2020-1564
Risk Factor: Critical
Base Score: 10
Temporal Score: 9.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CVSS Score Source: CVE-2020-1467
CPE: cpe:/o:microsoft:windows_7, cpe:/o:microsoft:windows_server_2008:r2
Required KB Items: SMB/MS_Bulletin_Checks/Possible
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 8/11/2020
Vulnerability Publication Date: 8/11/2020
CISA Known Exploited Vulnerability Due Dates: 9/21/2020, 5/3/2022
Core Impact
Metasploit (Microsoft Spooler Local Privilege Elevation Vulnerability)
CVE: CVE-2020-1046, CVE-2020-1337, CVE-2020-1339, CVE-2020-1377, CVE-2020-1378, CVE-2020-1379, CVE-2020-1380, CVE-2020-1383, CVE-2020-1464, CVE-2020-1467, CVE-2020-1470, CVE-2020-1472, CVE-2020-1473, CVE-2020-1474, CVE-2020-1475, CVE-2020-1476, CVE-2020-1477, CVE-2020-1478, CVE-2020-1484, CVE-2020-1485, CVE-2020-1486, CVE-2020-1489, CVE-2020-1513, CVE-2020-1515, CVE-2020-1516, CVE-2020-1517, CVE-2020-1518, CVE-2020-1519, CVE-2020-1520, CVE-2020-1529, CVE-2020-1530, CVE-2020-1534, CVE-2020-1537, CVE-2020-1538, CVE-2020-1552, CVE-2020-1554, CVE-2020-1557, CVE-2020-1558, CVE-2020-1562, CVE-2020-1564, CVE-2020-1567, CVE-2020-1570, CVE-2020-1577, CVE-2020-1579, CVE-2020-1584, CVE-2020-1587