8.8
CVSSv3

CVE-2020-1020

Published: 15/04/2020 Updated: 12/07/2022
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles a specially-crafted multi-master font - Adobe Type 1 PostScript format.For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely, aka 'Adobe Font Manager Library Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0938.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows server 2008 r2

microsoft windows server 2012 r2

microsoft windows 10 1607

microsoft windows 8.1 -

microsoft windows server 2016 -

microsoft windows server 2008 -

microsoft windows 7 -

microsoft windows rt 8.1 -

microsoft windows 10 -

microsoft windows 10 1709

microsoft windows 10 1803

microsoft windows 10 1809

microsoft windows 10 1903

microsoft windows 10 1909

microsoft windows server 2012 -

microsoft windows server 2016 1803

microsoft windows server 2016 1903

microsoft windows server 2016 1909

microsoft windows server 2019 -

Github Repositories

Windows Font Driver Type 1 VToHOrigin stack corruption

CVE-2020-1020 Windows Font Driver Type 1 VToHOrigin stack corruption only works on win7 x64

Recent Articles

Microsoft Patch Tuesday - April 2020
Symantec Threat Intelligence Blog • Preethi Koroth • 15 Apr 2024

This month the vendor has patched 113 vulnerabilities, 18 of which are rated Critical.

Posted: 15 Apr, 202029 Min ReadThreat Intelligence SubscribeMicrosoft Patch Tuesday - April 2020This month the vendor has patched 113 vulnerabilities, 18 of which are rated Critical.As always, customers are advised to follow these security best practices: Install vendor patches as soon as they are available. Run all software with the least privileges required while still maintaining functionality. Avoid handling files from unknown or questionable ...