Exploited Vulnerabilities Catalog 2020(128)


H  2025(48)  2024(144)  2023(152)  2022(126)  2021(203)  2020(142) 


Sophos | XG Firewall

CVE-2020-15069 

Sophos XG Firewall Buffer Overflow Vulnerability: Sophos XG Firewall contains a buffer overflow vulnerability that allows for remote code execution via the "HTTP/S bookmark" feature.

Related CWE: CWE-120

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Date Added: 2025-02-06

  • Due Date: 2025-02-27

Sophos | CyberoamOS

CVE-2020-29574 

CyberoamOS (CROS) SQL Injection Vulnerability: CyberoamOS (CROS) contains a SQL injection vulnerability in the WebAdmin that allows an unauthenticated attacker to execute arbitrary SQL statements remotely.

Related CWE: CWE-89

Known To Be Used in Ransomware Campaigns? Unknown

Action: The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.

  • Date Added: 2025-02-06

  • Due Date: 2025-02-27

JQuery | JQuery

CVE-2020-11023 

JQuery Cross-Site Scripting (XSS) Vulnerability: JQuery contains a persistent cross-site scripting (XSS) vulnerability. When passing maliciously formed, untrusted input enclosed in HTML tags, JQuery's DOM manipulators can execute untrusted code in the context of the user's browser.

Related CWE: CWE-79

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Date Added: 2025-01-23

  • Due Date: 2025-02-13

Oracle | WebLogic Server

CVE-2020-2883 

Oracle WebLogic Server Unspecified Vulnerability: Oracle WebLogic Server, a product within the Fusion Middleware suite, contains an unspecified vulnerability exploitable by an unauthenticated attacker with network access via IIOP or T3.

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Date Added: 2025-01-07

  • Due Date: 2025-01-28

DrayTek | Multiple Vigor Routers

CVE-2020-15415 

DrayTek Multiple Vigor Routers OS Command Injection Vulnerability: DrayTek Vigor3900, Vigor2960, and Vigor300B devices contain an OS command injection vulnerability in cgi-bin/mainfunction.cgi/cvmcfgupload that allows for remote code execution via shell metacharacters in a filename when the text/x-python-script content type is used.

Related CWE: CWE-78

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Date Added: 2024-09-30

  • Due Date: 2024-10-21

Oracle | WebLogic Server

CVE-2020-14644 

Oracle WebLogic Server Remote Code Execution Vulnerability: Oracle WebLogic Server, a product within the Fusion Middleware suite, contains a deserialization vulnerability. Unauthenticated attackers with network access via T3 or IIOP can exploit this vulnerability to achieve remote code execution.

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Date Added: 2024-09-18

  • Due Date: 2024-10-09

Microsoft | SQL Server

CVE-2020-0618 

Microsoft SQL Server Reporting Services Remote Code Execution Vulnerability: Microsoft SQL Server Reporting Services contains a deserialization vulnerability when handling page requests incorrectly. An authenticated attacker can exploit this vulnerability to execute code in the context of the Report Server service account.

Related CWE: CWE-502

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Date Added: 2024-09-18

  • Due Date: 2024-10-09

Roundcube | Webmail

CVE-2020-13965 

Roundcube Webmail Cross-Site Scripting (XSS) Vulnerability: Roundcube Webmail contains a cross-site scripting (XSS) vulnerability that allows a remote attacker to manipulate data via a malicious XML attachment.

Related CWE: CWE-80

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Date Added: 2024-06-26

  • Due Date: 2024-07-17

Apache | Flink

CVE-2020-17519 

Apache Flink Improper Access Control Vulnerability: Apache Flink contains an improper access control vulnerability that allows an attacker to read any file on the local filesystem of the JobManager through its REST interface.

Related CWE: CWE-552

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Date Added: 2024-05-23

  • Due Date: 2024-06-13

Cisco | Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD)

CVE-2020-3259 

Cisco ASA and FTD Information Disclosure Vulnerability: Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) contain an information disclosure vulnerability. An attacker could retrieve memory contents on an affected device, which could lead to the disclosure of confidential information due to a buffer tracking issue when the software parses invalid URLs that are requested from the web services interface. This vulnerability affects only specific AnyConnect and WebVPN configurations.

Related CWE: CWE-200

Known To Be Used in Ransomware Campaigns? Known

Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Date Added: 2024-02-15

  • Due Date: 2024-03-07

Oracle | Fusion Middleware

CVE-2020-2551 

Oracle Fusion Middleware Unspecified Vulnerability: Oracle Fusion Middleware contains an unspecified vulnerability in the WLS Core Components that allows an unauthenticated attacker with network access via IIOP to compromise the WebLogic Server.

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • Date Added: 2023-11-16

  • Due Date: 2023-12-07

Roundcube | Roundcube Webmail

CVE-2020-35730 

Roundcube Webmail Cross-Site Scripting (XSS) Vulnerability: Roundcube Webmail contains a cross-site scripting (XSS) vulnerability that allows an attacker to send a plain text e-mail message with Javascript in a link reference element that is mishandled by linkref_addinindex in rcube_string_replacer.php.

Related CWE: CWE-79

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2023-06-22

  • Due Date: 2023-07-13

Roundcube | Roundcube Webmail

CVE-2020-12641 

Roundcube Webmail Remote Code Execution Vulnerability: Roundcube Webmail contains an remote code execution vulnerability that allows attackers to execute code via shell metacharacters in a configuration setting for im_convert_path or im_identify_path.

Related CWE: CWE-78

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2023-06-22

  • Due Date: 2023-07-13

Plex | Media Server

CVE-2020-5741 

Plex Media Server Remote Code Execution Vulnerability: Plex Media Server contains a remote code execution vulnerability that allows an attacker with access to the server administrator's Plex account to upload a malicious file via the Camera Upload feature and have the media server execute it.

Related CWE: CWE-502

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2023-03-10

  • Due Date: 2023-03-31

Cisco | AnyConnect Secure

CVE-2020-3433 

Cisco AnyConnect Secure Mobility Client for Windows DLL Hijacking Vulnerability: Cisco AnyConnect Secure Mobility Client for Windows interprocess communication (IPC) channel allows for insufficient validation of resources that are loaded by the application at run time. An attacker with valid credentials on Windows could execute code on the affected machine with SYSTEM privileges.

Related CWE: CWE-427

Known To Be Used in Ransomware Campaigns? Known

Action: Apply updates per vendor instructions.

  • Date Added: 2022-10-24

  • Due Date: 2022-11-14

Cisco | AnyConnect Secure

CVE-2020-3153 

Cisco AnyConnect Secure Mobility Client for Windows Uncontrolled Search Path Vulnerability: Cisco AnyConnect Secure Mobility Client for Windows allows for incorrect handling of directory paths. An attacker with valid credentials on Windows would be able to copy malicious files to arbitrary locations with system level privileges. This could include DLL pre-loading, DLL hijacking, and other related attacks.

Related CWE: CWE-427

Known To Be Used in Ransomware Campaigns? Known

Action: Apply updates per vendor instructions.

  • Date Added: 2022-10-24

  • Due Date: 2022-11-14

Apple | iOS, iPadOS, and macOS

CVE-2020-9934 

Apple iOS, iPadOS, and macOS Input Validation Vulnerability: Apple iOS, iPadOS, and macOS contain an unspecified vulnerability involving input validation which can allow a local attacker to view sensitive user information.

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2022-09-08

  • Due Date: 2022-09-29

PEAR | Archive_Tar

CVE-2020-36193 

PEAR Archive_Tar Improper Link Resolution Vulnerability: PEAR Archive_Tar Tar.php allows write operations with directory traversal due to inadequate checking of symbolic links. PEAR stands for PHP Extension and Application Repository and it is an open-source framework and distribution system for reusable PHP components with known usage in third-party products such as Drupal Core and Red Hat Linux.

Related CWEs: CWE-22| CWE-59

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2022-08-25

  • Due Date: 2022-09-15

PEAR | Archive_Tar

CVE-2020-28949 

PEAR Archive_Tar Deserialization of Untrusted Data Vulnerability: PEAR Archive_Tar allows an unserialization attack because phar: is blocked but PHAR: is not blocked. PEAR stands for PHP Extension and Application Repository and it is an open-source framework and distribution system for reusable PHP components with known usage in third-party products such as Drupal Core and Red Hat Linux.

Related CWE: CWE-74

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2022-08-25

  • Due Date: 2022-09-15

Apple | Multiple Products

CVE-2020-3837 

Apple Multiple Products Memory Corruption Vulnerability: Apple iOS, iPadOS, macOS, tvOS, and watchOS contain a memory corruption vulnerability that could allow an application to execute code with kernel privileges.

Related CWE: CWE-787

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2022-06-27

  • Due Date: 2022-07-18

Apple | Multiple Products

CVE-2020-9907 

Apple Multiple Products Memory Corruption Vulnerability: Apple iOS, iPadOS, and tvOS contain a memory corruption vulnerability that could allow an application to execute code with kernel privileges.

Related CWE: CWE-787

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2022-06-27

  • Due Date: 2022-07-18

Microsoft | Windows

CVE-2020-1027 

Microsoft Windows Kernel Privilege Escalation Vulnerability: An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.

Related CWE: CWE-787

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2022-05-23

  • Due Date: 2022-06-13

Microsoft | Update Notification Manager

CVE-2020-0638 

Microsoft Update Notification Manager Privilege Escalation Vulnerability: Microsoft Update Notification Manager contains an unspecified vulnerability that allows for privilege escalation.

Known To Be Used in Ransomware Campaigns? Known

Action: Apply updates per vendor instructions.

  • Date Added: 2022-05-23

  • Due Date: 2022-06-13

QNAP | QNAP Network-Attached Storage (NAS)

CVE-2020-2509 

QNAP Network-Attached Storage (NAS) Command Injection Vulnerability: QNAP NAS devices contain a command injection vulnerability which could allow attackers to perform remote code execution.

Related CWEs: CWE-77| CWE-78

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2022-04-11

  • Due Date: 2022-05-02

D-Link | DIR-610 Devices

CVE-2020-9377 

D-Link DIR-610 Devices Remote Command Execution: D-Link DIR-610 devices allow remote code execution via the cmd parameter to command.php.

Related CWE: CWE-78

Known To Be Used in Ransomware Campaigns? Unknown

Action: The impacted product is end-of-life and should be disconnected if still in use.

  • Date Added: 2022-03-25

  • Due Date: 2022-04-15

Zyxel | Multiple Network-Attached Storage (NAS) Devices

CVE-2020-9054 

Zyxel Multiple NAS Devices OS Command Injection Vulnerability: Multiple Zyxel network-attached storage (NAS) devices contain a pre-authentication command injection vulnerability, which may allow a remote, unauthenticated attacker to execute arbitrary code.

Related CWE: CWE-78

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2022-03-25

  • Due Date: 2022-04-15

OpenBSD | OpenSMTPD

CVE-2020-7247 

OpenSMTPD Remote Code Execution Vulnerability: smtp_mailaddr in smtp_session.c in OpenSMTPD, as used in OpenBSD and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session.

Related CWEs: CWE-755| CWE-78

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2022-03-25

  • Due Date: 2022-04-15

VMware Tanzu | Spring Cloud Configuration (Config) Server

CVE-2020-5410 

VMware Tanzu Spring Cloud Config Directory Traversal Vulnerability: Spring, by VMware Tanzu, Cloud Config contains a path traversal vulnerability that allows applications to serve arbitrary configuration files.

Related CWE: CWE-23

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2022-03-25

  • Due Date: 2022-04-15

Sophos | SG UTM

CVE-2020-25223 

Sophos SG UTM Remote Code Execution Vulnerability: A remote code execution vulnerability exists in the WebAdmin of Sophos SG UTM.

Related CWE: CWE-78

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2022-03-25

  • Due Date: 2022-04-15

QNAP Systems | Helpdesk

CVE-2020-2506 

QNAP Helpdesk Improper Access Control Vulnerability: QNAP Helpdesk contains an improper access control vulnerability which could allow an attacker to gain privileges or to read sensitive information.

Related CWE: CWE-284

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2022-03-25

  • Due Date: 2022-04-15

Palo Alto Networks | PAN-OS

CVE-2020-2021 

Palo Alto Networks PAN-OS Authentication Bypass Vulnerability: Palo Alto Networks PAN-OS contains a vulnerability in SAML which allows an attacker to bypass authentication.

Related CWE: CWE-347

Known To Be Used in Ransomware Campaigns? Known

Action: Apply updates per vendor instructions.

  • Date Added: 2022-03-25

  • Due Date: 2022-04-15

Apache | Kylin

CVE-2020-1956 

Apache Kylin OS Command Injection Vulnerability: Apache Kylin contains an OS command injection vulnerability which could permit an attacker to perform remote code execution.

Related CWE: CWE-78

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2022-03-25

  • Due Date: 2022-04-15

Juniper | Junos OS

CVE-2020-1631 

Juniper Junos OS Path Traversal Vulnerability: A path traversal vulnerability in the HTTP/HTTPS service used by J-Web, Web Authentication, Dynamic-VPN (DVPN), Firewall Authentication Pass-Through with Web-Redirect, and Zero Touch Provisioning (ZTP) allows an unauthenticated attacker to perform remote code execution.

Related CWEs: CWE-22| CWE-73

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2022-03-25

  • Due Date: 2022-04-15

SonicWall | SonicOS

CVE-2020-5135 

SonicWall SonicOS Buffer Overflow Vulnerability: A buffer overflow vulnerability in SonicOS allows a remote attacker to cause Denial of Service (DoS) and potentially execute arbitrary code by sending a malicious request to the firewall.

Related CWE: CWE-120

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2022-03-15

  • Due Date: 2022-04-05

Pulse Secure | Pulse Connect Secure

CVE-2020-8218 

Pulse Connect Secure Code Injection Vulnerability: A code injection vulnerability exists in Pulse Connect Secure that allows an attacker to crafted a URI to perform an arbitrary code execution via the admin web interface.

Related CWE: CWE-94

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2022-03-07

  • Due Date: 2022-09-07

Apache | Tomcat

CVE-2020-1938 

Apache Tomcat Improper Privilege Management Vulnerability: Apache Tomcat treats Apache JServ Protocol (AJP) connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited.

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2022-03-03

  • Due Date: 2022-03-17

Treck TCP/IP stack | IPv6

CVE-2020-11899 

Treck TCP/IP stack Out-of-Bounds Read Vulnerability: The Treck TCP/IP stack contains an IPv6 out-of-bounds read vulnerability.

Related CWE: CWE-125

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2022-03-03

  • Due Date: 2022-03-17

Microsoft | SMBv3

CVE-2020-0796 

Microsoft SMBv3 Remote Code Execution Vulnerability: A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to execute code on the target server or client.

Related CWE: CWE-119

Known To Be Used in Ransomware Campaigns? Known

Action: Apply updates per vendor instructions.

  • Date Added: 2022-02-10

  • Due Date: 2022-08-10

Grandstream | UCM6200

CVE-2020-5722 

Grandstream Networks UCM6200 Series SQL Injection Vulnerability: Grandstream UCM6200 series is vulnerable to an unauthenticated remote SQL injection via crafted HTTP request. Exploitation can allow for code execution as root.

Related CWE: CWE-89

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2022-01-28

  • Due Date: 2022-07-28

Microsoft | Windows

CVE-2020-0787 

Microsoft Windows Background Intelligent Transfer Service (BITS) Improper Privilege Management Vulnerability: Microsoft Windows BITS is vulnerable to to a privilege elevation vulnerability if it improperly handles symbolic links. An actor can exploit this vulnerability to execute arbitrary code with system-level privileges.

Related CWEs: CWE-269| CWE-59

Known To Be Used in Ransomware Campaigns? Known

Action: Apply updates per vendor instructions.

  • Date Added: 2022-01-28

  • Due Date: 2022-07-28

Oracle | Intelligence Enterprise Edition

CVE-2020-14864 

Oracle Business Intelligence Enterprise Edition Path Transversal: Path traversal vulnerability, where an attacker can target the preview FilePath parameter of the getPreviewImage function to get access to arbitrary system file.

Related CWE: CWE-22

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2022-01-18

  • Due Date: 2022-07-18

Drupal | Drupal core

CVE-2020-13671 

Drupal core Un-restricted Upload of File: Improper sanitization in the extension file names is present in Drupal core.

Related CWE: CWE-434

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2022-01-18

  • Due Date: 2022-07-18

Apache | Airflow

CVE-2020-11978 

Apache Airflow Command Injection: A remote code/command injection vulnerability was discovered in one of the example DAGs shipped with Airflow.

Related CWE: CWE-78

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2022-01-18

  • Due Date: 2022-07-18

Apache | Airflow's Experimental API

CVE-2020-13927 

Apache Airflow's Experimental API Authentication Bypass: The previous default setting for Airflow's Experimental API was to allow all API requests without authentication.

Related CWEs: CWE-1188| CWE-306

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2022-01-18

  • Due Date: 2022-07-18

Google | Chrome Media

CVE-2020-6572 

Google Chrome Media Use-After-Free Vulnerability: Google Chrome Media contains a use-after-free vulnerability that allows a remote attacker to execute code via a crafted HTML page.

Related CWE: CWE-416

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2022-01-10

  • Due Date: 2022-07-10

Fuel CMS | Fuel CMS

CVE-2020-17463 

Fuel CMS SQL Injection Vulnerability: FUEL CMS 1.4.7 allows SQL Injection via the col parameter to /pages/items, /permissions/items, or /navigation/items.

Related CWE: CWE-89

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-12-10

  • Due Date: 2022-06-10

Pi-hole | AdminLTE

CVE-2020-8816 

Pi-Hole AdminLTE Remote Code Execution Vulnerability: Pi-hole Web v4.3.2 (aka AdminLTE) allows Remote Code Execution by privileged dashboard users via a crafted DHCP static lease.

Related CWE: CWE-78

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-12-10

  • Due Date: 2022-06-10

Qualcomm | Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

CVE-2020-11261 

Qualcomm Multiple Chipsets Improper Input Validation Vulnerability: Memory corruption due to improper check to return error when user application requests memory allocation of a huge size in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Related CWE: CWE-20

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-12-01

  • Due Date: 2022-06-01

Amcrest | Cameras and Network Video Recorder (NVR)

CVE-2020-5735 

Amcrest Cameras and NVR Stack-based Buffer Overflow Vulnerability: Amcrest cameras and NVR contain a stack-based buffer overflow vulnerability through port 37777 that allows an unauthenticated, remote attacker to crash the device and possibly execute code.

Related CWE: CWE-121

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Android | Android Kernel

CVE-2019-2215 

Android Kernel Use-After-Free Vulnerability: Android Kernel contains a use-after-free vulnerability in binder.c that allows for privilege escalation from an application to the Linux Kernel. This vulnerability was observed chained with CVE-2020-0041 and CVE-2020-0069 under exploit chain "AbstractEmu."

Related CWE: CWE-416

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Android | Android Kernel

CVE-2020-0041 

Android Kernel Out-of-Bounds Write Vulnerability: Android Kernel binder_transaction of binder.c contains an out-of-bounds write vulnerability due to an incorrect bounds check that could allow for local privilege escalation. This vulnerability was observed chained with CVE-2019-2215 and CVE-2020-0069 under exploit chain "AbstractEmu."

Related CWE: CWE-20

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

MediaTek | Multiple Chipsets

CVE-2020-0069 

Mediatek Multiple Chipsets Insufficient Input Validation Vulnerability: Multiple MediaTek chipsets contain an insufficient input validation vulnerability and have missing SELinux restrictions in the Command Queue drivers ioctl handlers. This causes an out-of-bounds write leading to privilege escalation. This vulnerability was observed chained with CVE-2019-2215 and CVE-2020-0041 under exploit chain "AbstractEmu."

Related CWE: CWE-787

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Apache | Struts

CVE-2020-17530 

Apache Struts Remote Code Execution Vulnerability: Forced Object-Graph Navigation Language (OGNL) evaluation in Apache Struts, when evaluated on raw user input in tag attributes, can lead to remote code execution.

Related CWE: CWE-917

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Apple | Multiple Products

CVE-2020-27930 

Apple Multiple Products Memory Corruption Vulnerability: Apple iOS, iPadOS, macOS, and watchOS FontParser contain a memory corruption vulnerability which may allow for code execution when processing maliciously crafted front.

Related CWE: CWE-787

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Apple | Multiple Products

CVE-2020-27950 

Apple Multiple Products Memory Initialization Vulnerability: Apple iOS, iPadOS, macOS, and watchOS contain a memory initialization vulnerability that may allow a malicious application to disclose kernel memory.

Related CWE: CWE-665

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Apple | Multiple Products

CVE-2020-27932 

Apple Multiple Products Type Confusion Vulnerability: Apple iOS, iPadOS, macOS, and watchOS contain a type confusion vulnerability that may allow a malicious application to execute code with kernel privileges.

Related CWE: CWE-843

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Apple | iOS, iPadOS, and watchOS

CVE-2020-9818 

Apple iOS, iPadOS, and watchOS Out-of-Bounds Write Vulnerability: Apple iOS, iPadOS, and watchOS Mail contains an out-of-bounds write vulnerability which may allow memory modification or application termination when processing a maliciously crafted mail message.

Related CWE: CWE-787

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Apple | iOS, iPadOS, and watchOS

CVE-2020-9819 

Apple iOS, iPadOS, and watchOS Memory Corruption Vulnerability: Apple iOS, iPadOS, and watchOS Mail contains a memory corruption vulnerability that may allow heap corruption when processing a maliciously crafted mail message.

Related CWE: CWE-787

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Apple | Multiple Products

CVE-2020-9859 

Apple Multiple Products Code Execution Vulnerability: Apple iOS, iPadOS, macOS, watchOS, and tvOS contain an unspecified vulnerability that may allow an application to execute code with kernel privileges.

Related CWE: CWE-415

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Cisco | Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD)

CVE-2020-3452 

Cisco ASA and FTD Read-Only Path Traversal Vulnerability: Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) contain an improper input validation vulnerability when HTTP requests process URLs. An attacker could exploit this vulnerability by sending a crafted HTTP request containing directory traversal character sequences to an affected device. A successful exploit could allow the attacker to view arbitrary files within the web services file system on the targeted device.

Related CWE: CWE-20

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Cisco | Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD)

CVE-2020-3580 

Cisco ASA and FTD Cross-Site Scripting (XSS) Vulnerability: Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) contain an insufficient input validation vulnerability for user-supplied input by the web services interface. Successful exploitation could allow an attacker to perform cross-site scripting (XSS) in the context of the interface or access sensitive browser-based information.

Related CWE: CWE-79

Known To Be Used in Ransomware Campaigns? Known

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Cisco | IOS XR

CVE-2020-3118 

Cisco IOS XR Software Discovery Protocol Format String Vulnerability: Cisco IOS XR improperly validates string input from certain fields in Cisco Discovery Protocol messages. Exploitation could allow an unauthenticated, adjacent attacker to execute code with administrative privileges or cause a reload on an affected device.

Related CWE: CWE-134

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Cisco | IOS XR

CVE-2020-3566 

Cisco IOS XR Software DVMRP Memory Exhaustion Vulnerability: Cisco IOS XR Distance Vector Multicast Routing Protocol (DVMRP) incorrectly handles Internet Group Management Protocol (IGMP) packets. Exploitation could allow an unauthenticated, remote attacker to immediately crash the IGMP process or make it consume available memory and eventually crash.

Related CWE: CWE-400

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Cisco | IOS XR

CVE-2020-3569 

Cisco IOS XR Software DVMRP Memory Exhaustion Vulnerability: Cisco IOS XR Distance Vector Multicast Routing Protocol (DVMRP) incorrectly handles Internet Group Management Protocol (IGMP) packets. Exploitation could allow an unauthenticated, remote attacker to immediately crash the IGMP process or make it consume available memory and eventually crash.

Related CWE: CWE-400

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Cisco | Cisco IP Phones

CVE-2020-3161 

Cisco IP Phones Web Server Remote Code Execution and Denial-of-Service Vulnerability: Cisco IP Phones contain an improper input validation vulnerability for HTTP requests. Exploitation could allow an attacker to execute code remotely with root privileges or cause a denial-of-service (DoS) condition.

Related CWE: CWE-20

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Citrix | Application Delivery Controller (ADC), Gateway, and SD-WAN WANOP Appliance

CVE-2020-8193 

Citrix ADC, Gateway, and SD-WAN WANOP Appliance Authorization Bypass Vulnerability: Citrix ADC, Citrix Gateway, and multiple Citrix SD-WAN WANOP appliance models contain an authorization bypass vulnerability that may allow unauthenticated access to certain URL endpoints. The attacker must have access to the NetScaler IP (NSIP) in order to perform exploitation.

Related CWE: CWE-284

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Citrix | Application Delivery Controller (ADC), Gateway, and SD-WAN WANOP Appliance

CVE-2020-8195 

Citrix ADC, Gateway, and SD-WAN WANOP Appliance Information Disclosure Vulnerability: Citrix ADC, Citrix Gateway, and multiple Citrix SD-WAN WANOP appliance models contain an information disclosure vulnerability.

Related CWE: CWE-20

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Citrix | Application Delivery Controller (ADC), Gateway, and SD-WAN WANOP Appliance

CVE-2020-8196 

Citrix ADC, Gateway, and SD-WAN WANOP Appliance Information Disclosure Vulnerability: Citrix ADC, Citrix Gateway, and multiple Citrix SD-WAN WANOP appliance models contain an information disclosure vulnerability.

Related CWE: CWE-284

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

D-Link | DIR-825 R1 Devices

CVE-2020-29557 

D-Link DIR-825 R1 Devices Buffer Overflow Vulnerability: D-Link DIR-825 R1 devices contain a buffer overflow vulnerability in the web interface that may allow for remote code execution.

Related CWE: CWE-119

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

D-Link | DNS-320 Device

CVE-2020-25506 

D-Link DNS-320 Device Command Injection Vulnerability: D-Link DNS-320 device contains a command injection vulnerability in the sytem_mgr.cgi component that may allow for remote code execution.

Related CWE: CWE-78

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

DrayTek | Multiple Vigor Routers

CVE-2020-8515 

Multiple DrayTek Vigor Routers Web Management Page Vulnerability: DrayTek Vigor3900, Vigor2960, and Vigor300B routers contain an unspecified vulnerability that allows for remote code execution.

Related CWE: CWE-78

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

EyesOfNetwork | EyesOfNetwork

CVE-2020-8657 

EyesOfNetwork Use of Hard-Coded Credentials Vulnerability: EyesOfNetwork contains a use of hard-coded credentials vulnerability, as it uses the same API key by default. Exploitation allows an attacker to calculate or guess the admin access token.

Related CWE: CWE-798

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

EyesOfNetwork | EyesOfNetwork

CVE-2020-8655 

EyesOfNetwork Improper Privilege Management Vulnerability: EyesOfNetwork contains an improper privilege management vulnerability that may allow a user to run commands as root via a crafted Nmap Scripting Engine (NSE) script to nmap7.

Related CWE: CWE-269

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

F5 | BIG-IP

CVE-2020-5902 

F5 BIG-IP Traffic Management User Interface (TMUI) Remote Code Execution Vulnerability: F5 BIG-IP Traffic Management User Interface (TMUI) contains a remote code execution vulnerability in undisclosed pages.

Related CWE: CWE-22

Known To Be Used in Ransomware Campaigns? Known

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Fortinet | FortiOS

CVE-2020-12812 

Fortinet FortiOS SSL VPN Improper Authentication Vulnerability: Fortinet FortiOS SSL VPN contains an improper authentication vulnerability that may allow a user to login successfully without being prompted for the second factor of authentication (FortiToken) if they change the case in their username.

Related CWEs: CWE-178| CWE-287

Known To Be Used in Ransomware Campaigns? Known

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Google | Chrome for Android UI

CVE-2020-16010 

Google Chrome for Android UI Heap Buffer Overflow Vulnerability: Google Chrome for Android UI contains a heap buffer overflow vulnerability that allows a remote attacker, who has compromised the renderer process, to potentially perform a sandbox escape via a crafted HTML page.

Related CWE: CWE-787

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Google | Chrome FreeType

CVE-2020-15999 

Google Chrome FreeType Heap Buffer Overflow Vulnerability: Google Chrome uses FreeType, an open-source software library to render fonts, which contains a heap buffer overflow vulnerability in the function Load_SBit_Png when processing PNG images embedded into fonts. This vulnerability is part of an exploit chain with CVE-2020-17087 on Windows and CVE-2020-16010 on Android.

Related CWE: CWE-787

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2021-11-17

Google | Chrome

CVE-2020-16017 

Google Chrome Use-After-Free Vulnerability: Google Chrome contains a use-after-free vulnerability that allows a remote attacker, who has compromised the renderer process, to potentially perform a sandbox escape via a crafted HTML page.

Related CWE: CWE-416

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Google | Chromium V8

CVE-2020-16009 

Google Chromium V8 Type Confusion Vulnerability: Google Chromium V8 Engine contains a type confusion vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

Related CWEs: CWE-787| CWE-843

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Google | Chromium V8

CVE-2020-16013 

Google Chromium V8 Incorrect Implementation Vulnerabililty: Google Chromium V8 Engine contains an inappropriate implementation vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

Related CWE: CWE-787

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Google | Chromium V8

CVE-2020-6418 

Google Chromium V8 Type Confusion Vulnerability: Google Chromium V8 Engine contains a type confusion vulnerability allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

Related CWE: CWE-843

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

IBM | Data Risk Manager

CVE-2020-4430 

IBM Data Risk Manager Directory Traversal Vulnerability: IBM Data Risk Manager contains a directory traversal vulnerability that could allow a remote authenticated attacker to traverse directories and send a specially crafted URL request to download arbitrary files from the system.

Related CWE: CWE-22

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

IBM | Data Risk Manager

CVE-2020-4427 

IBM Data Risk Manager Security Bypass Vulnerability: IBM Data Risk Manager contains a security bypass vulnerability that could allow a remote attacker to bypass security restrictions when configured with SAML authentication. By sending a specially crafted HTTP request, an attacker could exploit this vulnerability to bypass the authentication process and gain full administrative access to the system.

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

IBM | Data Risk Manager

CVE-2020-4428 

IBM Data Risk Manager Remote Code Execution Vulnerability: IBM Data Risk Manager contains an unspecified vulnerability which could allow a remote, authenticated attacker to execute commands on the system.�

Related CWE: CWE-78

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Ivanti | MobileIron Multiple Products

CVE-2020-15505 

Ivanti MobileIron Multiple Products Remote Code Execution Vulnerability: Ivanti MobileIron's Core & Connector, Sentry, and Monitor and Reporting Database (RDB) products contain an unspecified vulnerability that allows for remote code execution.

Related CWE: CWE-706

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Liferay | Liferay Portal

CVE-2020-7961 

Liferay Portal Deserialization of Untrusted Data Vulnerability: Liferay Portal contains a deserialization of untrusted data vulnerability that allows remote attackers to execute code via JSON web services.

Related CWE: CWE-502

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Microsoft | Edge and Internet Explorer

CVE-2020-0878 

Microsoft Edge and Internet Explorer Memory Corruption Vulnerability: Microsoft Edge and Internet Explorer contain a memory corruption vulnerability that allows attackers to execute code in the context of the current user.

Related CWE: CWE-787

Known To Be Used in Ransomware Campaigns? Known

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Microsoft | Windows

CVE-2020-0683 

Microsoft Windows Installer Privilege Escalation Vulnerability: Microsoft Windows Installer contains a privilege escalation vulnerability when MSI packages process symbolic links, which allows attackers to bypass access restrictions to add or remove files.

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Microsoft | Windows

CVE-2020-17087 

Microsoft Windows Kernel Privilege Escalation Vulnerability: Microsoft Windows kernel contains an unspecified vulnerability that allows for privilege escalation.

Related CWE: CWE-131

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Microsoft | Windows

CVE-2020-0938 

Microsoft Windows Adobe Font Manager Library Remote Code Execution Vulnerability: Microsoft Windows Adobe Font Manager Library contains an unspecified vulnerability when handling specially crafted multi-master fonts (Adobe Type 1 PostScript format) that allows for remote code execution for all systems except Windows 10. For systems running Windows 10, an attacker who successfully exploited the vulnerability could execute code in an AppContainer sandbox context with limited privileges and capabilities.

Related CWE: CWE-787

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Microsoft | Exchange Server

CVE-2020-17144 

Microsoft Exchange Server Remote Code Execution Vulnerability: Microsoft Exchange Server improperly validates cmdlet arguments which allow an attacker to perform remote code execution.

Related CWE: CWE-502

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Microsoft | Windows

CVE-2020-0986 

Microsoft Windows Kernel Privilege Escalation Vulnerability: Microsoft Windows kernel contains an unspecified vulnerability when handling objects in memory that allows attackers to escalate privileges and execute code in kernel mode.

Related CWE: CWE-787

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Microsoft | Windows

CVE-2020-1020 

Microsoft Windows Adobe Font Manager Library Remote Code Execution Vulnerability: Microsoft Windows Adobe Font Manager Library contains an unspecified vulnerability when handling specially crafted multi-master fonts (Adobe Type 1 PostScript format) that allows for remote code execution for all systems except Windows 10. For systems running Windows 10, an attacker who successfully exploited the vulnerability could execute code in an AppContainer sandbox context with limited privileges and capabilities.

Related CWE: CWE-787

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Microsoft | Exchange Server

CVE-2020-0688 

Microsoft Exchange Server Validation Key Remote Code Execution Vulnerability: Microsoft Exchange Server Validation Key fails to properly create unique keys at install time, allowing for remote code execution.

Related CWE: CWE-287

Known To Be Used in Ransomware Campaigns? Known

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Microsoft | Windows

CVE-2020-1464 

Microsoft Windows Spoofing Vulnerability: Microsoft Windows contains a spoofing vulnerability when Windows incorrectly validates file signatures, allowing an attacker to bypass security features and load improperly signed files.

Related CWE: CWE-347

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Microsoft | Hyper-V RemoteFX

CVE-2020-1040 

Microsoft Hyper-V RemoteFX vGPU Remote Code Execution Vulnerability: Microsoft Hyper-V RemoteFX vGPU contains an improper input validation vulnerability due to the host server failing to properly validate input from an authenticated user on a guest operating system. Successful exploitation allows for remote code execution on the host operating system.

Related CWE: CWE-20

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Microsoft | Windows

CVE-2020-1350 

Microsoft Windows DNS Server Remote Code Execution Vulnerability: Microsoft Windows DNS Servers fail to properly handle requests, allowing an attacker to perform remote code execution in the context of the Local System Account. The vulnerability is also known under the moniker of SIGRed.

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2020-07-24

Microsoft | Internet Explorer

CVE-2020-0674 

Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability: Microsoft Internet Explorer contains a memory corruption vulnerability due to the way the Scripting Engine handles objects in memory. Successful exploitation could allow remote code execution in the context of the current user.

Related CWE: CWE-416

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Microsoft | Internet Explorer

CVE-2020-1380 

Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability: Microsoft Internet Explorer contains a memory corruption vulnerability which can allow for remote code execution in the context of the current user.

Related CWE: CWE-787

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Microsoft | Internet Explorer

CVE-2020-0968 

Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability: Microsoft Internet Explorer contains a memory corruption vulnerability due to how the Scripting Engine handles objects in memory, leading to remote code execution.

Related CWE: CWE-787

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Microsoft | Netlogon

CVE-2020-1472 

Microsoft Netlogon Privilege Escalation Vulnerability: Microsoft's Netlogon Remote Protocol (MS-NRPC) contains a privilege escalation vulnerability when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller. An attacker who successfully exploits the vulnerability could run a specially crafted application on a device on the network. The vulnerability is also known under the moniker of Zerologon.

Related CWE: CWE-330

Known To Be Used in Ransomware Campaigns? Known

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2020-09-21

Microsoft | Win32k

CVE-2020-1054 

Microsoft Win32k Privilege Escalation Vulnerability: Microsoft Win32k contains a privilege escalation vulnerability when the Windows kernel-mode driver fails to properly handle objects in memory. Successful exploitation allows an attacker to execute code in kernel mode.

Related CWE: CWE-787

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Microsoft | Windows

CVE-2020-0601 

Microsoft Windows CryptoAPI Spoofing Vulnerability: Microsoft Windows CryptoAPI (Crypt32.dll) contains a spoofing vulnerability in the way it validates Elliptic Curve Cryptography (ECC) certificates. An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source. A successful exploit could also allow the attacker to conduct man-in-the-middle attacks and decrypt confidential information on user connections to the affected software. The vulnerability is also known under the moniker of CurveBall.

Related CWE: CWE-295

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2020-01-29

Microsoft | .NET Framework

CVE-2020-0646 

Microsoft .NET Framework Remote Code Execution Vulnerability: Microsoft .NET Framework contains an improper input validation vulnerability that allows for remote code execution.

Related CWE: CWE-91

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Microsoft | .NET Framework, SharePoint, Visual Studio

CVE-2020-1147 

Microsoft .NET Framework, SharePoint, and Visual Studio Remote Code Execution Vulnerability: Microsoft .NET Framework, Microsoft SharePoint, and Visual Studio contain a remote code execution vulnerability when the software fails to check the source markup of XML file input. Successful exploitation allows an attacker to execute code in the context of the process responsible for deserialization of the XML content.

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Mozilla | Firefox and Thunderbird

CVE-2020-6819 

Mozilla Firefox And Thunderbird Use-After-Free Vulnerability: Mozilla Firefox and Thunderbird contain a race condition vulnerability when running the nsDocShell destructor under certain conditions. The race condition creates a use-after-free vulnerability, causing unspecified impacts.

Related CWEs: CWE-362| CWE-416

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Mozilla | Firefox and Thunderbird

CVE-2020-6820 

Mozilla Firefox And Thunderbird Use-After-Free Vulnerability: Mozilla Firefox and Thunderbird contain a race condition vulnerability when handling a ReadableStream under certain conditions. The race condition creates a use-after-free vulnerability, causing unspecified impacts.

Related CWE: CWE-362

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

NETGEAR | JGS516PE Devices

CVE-2020-26919 

Netgear JGS516PE Devices Missing Function Level Access Control Vulnerability: Netgear JGS516PE devices contain a missing function level access control vulnerability.

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Oracle | Multiple Products

CVE-2020-2555 

Oracle Multiple Products Remote Code Execution Vulnerability: Multiple Oracle products contain a remote code execution vulnerability that allows an unauthenticated attacker with network access via T3 or HTTP to takeover the affected system. Impacted Oracle products: Oracle Coherence in Fusion Middleware, Oracle Utilities Framework, Oracle Retail Assortment Planning, Oracle Commerce, Oracle Communications Diameter Signaling Router (DSR).

Related CWE: CWE-502

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Oracle | Solaris and Zettabyte File System (ZFS)

CVE-2020-14871 

Oracle Solaris and Zettabyte File System (ZFS) Unspecified Vulnerability: Oracle Solaris and Oracle ZFS Storage Appliance Kit contain an unspecified vulnerability causing high impacts to confidentiality, integrity, and availability of affected systems.

Related CWE: CWE-787

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Oracle | WebLogic Server

CVE-2020-14750 

Oracle WebLogic Server Remote Code Execution Vulnerability: Oracle WebLogic Server contains an unspecified vulnerability allowing an unauthenticated attacker to perform remote code execution. This vulnerability is related to CVE-2020-14882.

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Oracle | WebLogic Server

CVE-2020-14882 

Oracle WebLogic Server Remote Code Execution Vulnerability: Oracle WebLogic Server contains an unspecified vulnerability, which is assessed to allow for remote code execution, based on this vulnerability being related to CVE-2020-14750.

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Oracle | WebLogic Server

CVE-2020-14883 

Oracle WebLogic Server Unspecified Vulnerability: Oracle WebLogic Server contains an unspecified vulnerability in the Console component with high impacts to confidentilaity, integrity, and availability.

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

PlaySMS | PlaySMS

CVE-2020-8644 

PlaySMS Server-Side Template Injection Vulnerability: PlaySMS contains a server-side template injection vulnerability that allows for remote code execution.

Related CWE: CWE-94

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Ivanti | Pulse Connect Secure

CVE-2020-8243 

Ivanti Pulse Connect Secure Code Execution Vulnerability: Ivanti Pulse Connect Secure contains an unspecified vulnerability in the admin web interface that could allow an authenticated attacker to upload a custom template to perform code execution.

Related CWE: CWE-94

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2021-04-23

Ivanti | Pulse Connect Secure

CVE-2020-8260 

Ivanti Pulse Connect Secure Code Execution Vulnerability: Pulse Connect Secure contains an unspecified vulnerability that allows an authenticated attacker to perform code execution using uncontrolled gzip extraction.

Related CWE: CWE-434

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2021-04-23

rConfig | rConfig

CVE-2020-10221 

rConfig OS Command Injection Vulnerability: rConfig lib/ajaxHandlers/ajaxAddTemplate.php contains an OS command injection vulnerability that allows remote attackers to execute OS commands via shell metacharacters in the fileName POST parameter.

Related CWE: CWE-78

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

SaltStack | Salt

CVE-2020-11652 

SaltStack Salt Path Traversal Vulnerability: SaltStack Salt contains a path traversal vulnerability in the salt-master process ClearFuncs which allows directory access to authenticated users. Salt users who follow fundamental internet security guidelines and best practices are not affected by this vulnerability.

Related CWE: CWE-22

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

SaltStack | Salt

CVE-2020-11651 

SaltStack Salt Authentication Bypass Vulnerability: SaltStack Salt contains an authentication bypass vulnerability in the salt-master process ClearFuncs due to improperly validating method calls. The vulnerability allows a remote user to access some methods without authentication, which can be used to retrieve user tokens from the salt master and/or run commands on salt minions. Salt users who follow fundamental internet security guidelines and best practices are not affected by this vulnerability.

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

SaltStack | Salt

CVE-2020-16846 

SaltStack Salt Shell Injection Vulnerability: SaltStack Salt allows an unauthenticated user with network access to the Salt API to use shell injections to run code on the Salt API using the SSH client. This vulnerability affects any users running the Salt API.

Related CWE: CWE-78

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

SAP | NetWeaver

CVE-2020-6287 

SAP NetWeaver Missing Authentication for Critical Function Vulnerability: SAP NetWeaver Application Server Java Platforms contains a missing authentication for critical function vulnerability allowing unauthenticated access to execute configuration tasks and create administrative users.

Related CWE: CWE-306

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

SAP | Solution Manager

CVE-2020-6207 

SAP Solution Manager Missing Authentication for Critical Function Vulnerability: SAP Solution Manager User Experience Monitoring contains a missing authentication for critical function vulnerability which results in complete compromise of all SMDAgents connected to the Solution Manager.

Related CWE: CWE-306

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

SolarWinds | Orion

CVE-2020-10148 

SolarWinds Orion Authentication Bypass Vulnerability: SolarWinds Orion API contains an authentication bypass vulnerability that could allow a remote attacker to execute API commands.

Related CWE: CWE-288

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Sonatype | Nexus Repository

CVE-2020-10199 

Sonatype Nexus Repository Remote Code Execution Vulnerability: Sonatype Nexus Repository contains an unspecified vulnerability that allows for remote code execution.

Related CWE: CWE-917

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Sophos | SFOS

CVE-2020-12271 

Sophos SFOS SQL Injection Vulnerability: Sophos Firewall operating system (SFOS) firmware contains a SQL injection vulnerability when configured with either the administration (HTTPS) service or the User Portal is exposed on the WAN zone. Successful exploitation may cause remote code execution to exfiltrate usernames and hashed passwords for the local device admin(s), portal admins, and user accounts used for remote access (but not external Active Directory or LDAP passwords).

Related CWE: CWE-89

Known To Be Used in Ransomware Campaigns? Known

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Sumavision | Enhanced Multimedia Router (EMR)

CVE-2020-10181 

Sumavision EMR Cross-Site Request Forgery (CSRF) Vulnerability: Sumavision Enhanced Multimedia Router (EMR) contains a cross-site request forgery (CSRF) vulnerability allowing the creation of users with elevated privileges as administrator on a device.

Related CWE: CWE-352

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Tenda | AC1900 Router AC15 Model

CVE-2020-10987 

Tenda AC1900 Router AC15 Model Remote Code Execution Vulnerability: Tenda AC1900 Router AC15 Model contains an unspecified vulnerability that allows remote attackers to execute system commands via the deviceName POST parameter.

Related CWE: CWE-78

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Trend Micro | Apex One and OfficeScan

CVE-2020-8467 

Trend Micro Apex One and OfficeScan Remote Code Execution Vulnerability: Trend Micro Apex One and OfficeScan contain an unspecified vulnerability within a migration tool component that allows for remote code execution.

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Trend Micro | Apex One, OfficeScan and Worry-Free Business Security Agents

CVE-2020-8468 

Trend Micro Multiple Products Content Validation Escape Vulnerability: Trend Micro Apex One, OfficeScan, and Worry-Free Business Security agents contain a content validation escape vulnerability that could allow an attacker to manipulate certain agent client components.

Related CWE: CWE-74

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Trend Micro | Apex One, OfficeScan, and Worry-Free Business Security

CVE-2020-24557 

Trend Micro Multiple Products Improper Access Control Vulnerability: Trend Micro Apex One, OfficeScan, and Worry-Free Business Security on Microsoft Windows contain an improper access control vulnerability that may allow an attacker to manipulate a particular product folder to disable the security temporarily, abuse a specific Windows function, and attain privilege escalation.

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Trend Micro | Apex One and OfficeScan

CVE-2020-8599 

Trend Micro Apex One and OfficeScan Authentication Bypass Vulnerability: Trend Micro Apex One and OfficeScan server contain a vulnerable EXE file that could allow a remote attacker to write data to a path on affected installations and bypass root login.

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Unraid | Unraid

CVE-2020-5849 

Unraid Authentication Bypass Vulnerability: Unraid contains an authentication bypass vulnerability that allows attackers to gain access to the administrative interface. This CVE is chainable with CVE-2020-5847 for remote code execution.

Related CWEs: CWE-287| CWE-697

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Unraid | Unraid

CVE-2020-5847 

Unraid Remote Code Execution Vulnerability: Unraid contains a vulnerability due to the insecure use of the extract PHP function that can be abused to execute remote code as root. This CVE is chainable with CVE-2020-5849 for initial access.

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

vBulletin | vBulletin

CVE-2020-17496 

vBulletin PHP Module Remote Code Execution Vulnerability: The PHP module within vBulletin contains an unspecified vulnerability that allows for remote code execution via crafted subWidgets data in an ajax/render/widget_tabbedcontainer_tab_panel request. This CVE ID resolves an incomplete patch for CVE-2019-16759.

Related CWE: CWE-74

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

VMware | ESXi

CVE-2020-3992 

VMware ESXi OpenSLP Use-After-Free Vulnerability: VMware ESXi OpenSLP contains a use-after-free vulnerability that allows an attacker residing in the management network with access to port 427 to perform remote code execution.

Related CWE: CWE-416

Known To Be Used in Ransomware Campaigns? Known

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

VMware | Multiple Products

CVE-2020-3950 

VMware Multiple Products Privilege Escalation Vulnerability: VMware Fusion, Remote Console (VMRC) for Mac, and Horizon Client for Mac contain a privilege escalation vulnerability due to improper use of setuid binaries that allows attackers to escalate privileges to root.

Related CWE: CWE-269

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

VMware | vCenter Server

CVE-2020-3952 

VMware vCenter Server Information Disclosure Vulnerability: VMware vCenter Server contains an information disclosure vulnerability in the VMware Directory Service (vmdir) when the Platform Services Controller (PSC) does not correctly implement access controls. Successful exploitation allows an attacker with network access to port 389 to extract sensitive information.

Related CWE: CWE-306

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

VMware | Multiple Products

CVE-2020-4006 

Multiple VMware Products Command Injection Vulnerability: VMware Workspace One Access, Access Connector, Identity Manager, and Identity Manager Connector contain a command injection vulnerability. An attacker with network access to the administrative configurator on port 8443 and a valid password for the configurator administrator account can execute commands with unrestricted privileges on the underlying operating system.

Related CWE: CWE-78

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

WordPress | File Manager Plugin

CVE-2020-25213 

WordPress File Manager Plugin Remote Code Execution Vulnerability: WordPress File Manager plugin contains a remote code execution vulnerability that allows unauthenticated users to execute PHP code and upload malicious files on a target site.

Related CWE: CWE-434

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

WordPress | Snap Creek Duplicator Plugin

CVE-2020-11738 

WordPress Snap Creek Duplicator Plugin File Download Vulnerability: WordPress Snap Creek Duplicator plugin contains a file download vulnerability when an administrator creates a new copy of their site that allows an attacker to download the generated files from their Wordpress dashboard. This vulnerability affects Duplicator and Dulplicator Pro.

Related CWE: CWE-22

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Zoho | ManageEngine

CVE-2020-10189 

Zoho ManageEngine Desktop Central File Upload Vulnerability: Zoho ManageEngine Desktop Central contains a file upload vulnerability that allows for unauthenticated remote code execution.

Related CWE: CWE-502

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03

Zyxel | Multiple Products

CVE-2020-29583 

Zyxel Multiple Products Use of Hard-Coded Credentials Vulnerability: Zyxel firewalls (ATP, USG, VM) and AP Controllers (NXC2500 and NXC5500) contain a use of hard-coded credentials vulnerability in an undocumented account ("zyfwp") with an unchangeable password.

Related CWE: CWE-522

Known To Be Used in Ransomware Campaigns? Unknown

Action: Apply updates per vendor instructions.

  • Date Added: 2021-11-03

  • Due Date: 2022-05-03