Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2020-17090 : What You Need to Know

Learn about CVE-2020-17090, a security feature bypass vulnerability in Microsoft Defender for Endpoint Security. Find out affected systems, impact, and mitigation steps.

Microsoft Defender for Endpoint Security Feature Bypass Vulnerability was published on November 10, 2020, with a CVSS base score of 5.3.

Understanding CVE-2020-17090

This CVE involves a security feature bypass in Microsoft Defender for Endpoint Security.

What is CVE-2020-17090?

The vulnerability allows attackers to bypass security features in Microsoft Defender for Endpoint Security, potentially leading to unauthorized access.

The Impact of CVE-2020-17090

The impact of this vulnerability is rated as MEDIUM with a base score of 5.3 according to the CVSS v3.1 metrics.

Technical Details of CVE-2020-17090

This section provides more technical insights into the vulnerability.

Vulnerability Description

The vulnerability allows threat actors to bypass security features in Microsoft Defender for Endpoint Security.

Affected Systems and Versions

        Windows 10 Version 2004
        Windows 10 Version 1809
        Windows 10 Version 20H2
        Windows Server version 2004
        Windows Server version 20H2
        Windows 10 Version 1803
        Windows 10 Version 1903 for 32-bit Systems
        Windows 10 Version 1909
        Windows Server, version 1909 (Server Core installation)
        Windows Server 2019 (Server Core installation)
        Windows 10 Version 1903 for x64-based Systems
        Windows 10 Version 1903 for ARM64-based Systems
        Windows Server, version 1903 (Server Core installation)
        Windows Server 2019

Exploitation Mechanism

The vulnerability can be exploited by attackers to bypass security controls and gain unauthorized access.

Mitigation and Prevention

To address CVE-2020-17090, follow these mitigation steps:

Immediate Steps to Take

        Apply the necessary security updates provided by Microsoft.
        Monitor for any unauthorized access or unusual activities on affected systems.

Long-Term Security Practices

        Regularly update and patch all software and systems to prevent vulnerabilities.
        Implement strong access controls and monitoring mechanisms to detect and respond to security incidents.

Patching and Updates

Ensure that all affected systems are updated with the latest security patches from Microsoft.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now