CVE-2020-0605: .NET Framework Remote Code Execution Vulnerability
Overview
- Severity
- N/A
- Category
- Remote Code Execution
- Exploit Status
- Not Exploited
- Exploitation Likelihood
- Less Likely
- Patch Tuesday
- 2020-Jan
- Released
- 2020-01-14
- Last Updated
- 2020-06-25
- EPSS Score
- 34.06% (percentile: 97.0%)
Description
A remote code execution vulnerability exists in .NET software when the software fails to check the source markup of a file.
An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of .NET Framework. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.
The security update addresses the vulnerability by correcting how .NET Framework checks the source markup of a file.
Affected Products (88)
Developer Tools
- .NET Core 3.0
- .NET Core 3.1
- PowerShell 7.0
- Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2 on Windows RT 8.1
- Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2 on Windows 8.1 for x64-based systems
- Microsoft .NET Framework 3.0 Service Pack 2 on Windows Server 2008 for Itanium-Based Systems Service Pack 2
- Microsoft .NET Framework 3.0 Service Pack 2 on Windows Server 2008 for 32-bit Systems Service Pack 2
- Microsoft .NET Framework 3.0 Service Pack 2 on Windows Server 2008 for x64-based Systems Service Pack 2
- Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1909 for 32-bit Systems
- Microsoft .NET Framework 3.5 AND 4.8 on Windows Server, version 1909 (Server Core installation)
- Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1909 for x64-based Systems
- Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server, version 1803 (Server Core Installation)
- Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2 on Windows 7 for 32-bit Systems Service Pack 1
- Microsoft .NET Framework 4.6/4.6.1/4.6.2 on Windows 10 for 32-bit Systems
- Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2 on Windows 8.1 for 32-bit systems
- Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2 on Windows 7 for x64-based Systems Service Pack 1
- Microsoft .NET Framework 4.6/4.6.1/4.6.2 on Windows 10 for x64-based Systems
- Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 R2
- Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 (Server Core installation)
- Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012
- Microsoft .NET Framework 4.8 on Windows Server, version 1803 (Server Core Installation)
- Microsoft .NET Framework 4.8 on Windows 10 Version 1803 for 32-bit Systems
- Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
- Microsoft .NET Framework 4.8 on Windows 10 Version 1709 for 32-bit Systems
- Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 R2 (Server Core installation)
- Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2008 R2 for x64-based Systems Service Pack 1
- Microsoft .NET Framework 4.8 on Windows 10 Version 1803 for x64-based Systems
- Microsoft .NET Framework 4.8 on Windows 10 Version 1709 for x64-based Systems
- Microsoft .NET Framework 4.8 on Windows Server 2012 R2 (Server Core installation)
- Microsoft .NET Framework 4.8 on Windows Server 2016 (Server Core installation)
- Microsoft .NET Framework 4.8 on Windows Server 2012
- Microsoft .NET Framework 4.8 on Windows 10 Version 1607 for x64-based Systems
- Microsoft .NET Framework 4.8 on Windows Server 2012 R2
- Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019
- Microsoft .NET Framework 4.6 on Windows Server 2008 for 32-bit Systems Service Pack 2
- Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for 32-bit Systems
- Microsoft .NET Framework 4.8 on Windows 7 for x64-based Systems Service Pack 1
- Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019
- Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1
- Microsoft .NET Framework 4.8 on Windows 10 Version 1607 for 32-bit Systems
- Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 (Server Core installation)
- Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 (Server Core installation)
- Microsoft .NET Framework 3.5 AND 4.8 on Windows Server, version 1903 (Server Core installation)
- Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
- Microsoft .NET Framework 4.8 on Windows 8.1 for 32-bit systems
- Microsoft .NET Framework 4.8 on Windows Server 2016
- Microsoft .NET Framework 4.8 on Windows RT 8.1
- Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for x64-based Systems
- Microsoft .NET Framework 4.8 on Windows Server 2012 (Server Core installation)
- Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1903 for 32-bit Systems
- ... and 38 more
Security Updates (40)
Acknowledgments
Soroush Dalili (<a href="https://twitter.com/irsdl">@irsdl</a>), Soroush Dalili (<a href="https://twitter.com/irsdl">@irsdl</a>)
Revision History
- 2020-01-14: Information published.
- 2020-03-10: Revised the Security Updates table to include PowerShell 7.0 because it addresses this vulnerability in preview versions of PowerShell 7. See https://github.com/PowerShell/Announcements-Internal/issues/19 for more information.
- 2020-05-12: To comprehensively address CVE-2020-0605, Microsoft has released the May 2020 security updates for all versions of Microsoft .NET, with the exception of: Microsoft .NET Framework 3.0 Service Pack 2, Microsoft .NET Framework 3.5, and Microsoft .NET Framework 3.5.1. Microsoft recommends that customers running any other versions of Microsoft .NET Framework should install the May 2020 security updates to be protected from this vulnerability.
- 2020-05-12: In the Security Updates table, corrected the versions of Microsoft .NET that are installed on Windows 10 for 32-bit Systems and Windows 10 for x64-based Systems. This is an informational change only.
- 2020-06-25: Corrected Download and Article links in the Security Updates table. This is an informational change only.