CVE-2020-0621: Windows Security Feature Bypass Vulnerability
Overview
- Severity
- Medium (CVSS 4.4)
- CVSS Vector
- CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C
- Category
- Security Feature Bypass
- Exploit Status
- Not Exploited
- Patch Tuesday
- 2020-Jan
- Released
- 2020-01-14
- EPSS Score
- 0.18% (percentile: 40.0%)
Description
A security feature bypass vulnerability exists in Windows 10 when third party filters are called during a password update. Successful exploitation of the vulnerability could allow a user to make use of a blocked password for their account.
To exploit the vulnerability, an attacker would need have access and the current password for the target user.
The update addresses how password filters are called during a password update.
Affected Products (12)
Windows
- Windows 10 Version 1803 for 32-bit Systems
- Windows 10 Version 1803 for x64-based Systems
- Windows Server, version 1803 (Server Core Installation)
- Windows 10 Version 1803 for ARM64-based Systems
- Windows 10 Version 1809 for 32-bit Systems
- Windows 10 Version 1809 for x64-based Systems
- Windows 10 Version 1809 for ARM64-based Systems
- Windows Server 2019
- Windows Server 2019 (Server Core installation)
- Windows 10 Version 1709 for 32-bit Systems
- Windows 10 Version 1709 for x64-based Systems
- Windows 10 Version 1709 for ARM64-based Systems
Security Updates (3)
Acknowledgments
Mattias Häggström, Chris Wong, and Darren Siegel of <a href="https://specopssoft.com/">Specops Software</a>
Revision History
- 2020-01-14: Information published.