Help Center/ Host Security Service/ Best Practices/ Detecting and Fixing Vulnerabilities/ Adobe Font Manager Library Remote Code Execution Vulnerability (CVE-2020-1020/CVE-2020-0938)
Updated on 2024-03-08 GMT+08:00

Adobe Font Manager Library Remote Code Execution Vulnerability (CVE-2020-1020/CVE-2020-0938)

A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles a specially-crafted multi-master font - Adobe Type 1 PostScript format.

For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely. For systems running Windows 10, an attacker who successfully exploited the vulnerability could execute code in an AppContainer sandbox context with limited privileges and capabilities. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

There are multiple ways an attacker could exploit the vulnerability, such as convincing a user to open a specially crafted document or viewing it in the Windows Preview pane.

Vulnerability ID

  • CVE-2020-1020
  • CVE-2020-0938

Vulnerability Name

Adobe Font Manager Library Remote Code Execution Vulnerability

Vulnerability Details

  • For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely.
  • For systems running Windows 10, an attacker who successfully exploited the vulnerability could execute code in an AppContainer sandbox context with limited privileges and capabilities. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

Scope of Impact

All Windows OSs

Official Solution

It is recommended that affected users install the latest vulnerability patch as soon as possible.

For details, see https://msrc.microsoft.com/update-guide/en-us/vulnerability/CVE-2020-1020.

Suggestion

Perform the following steps to scan and fix a vulnerability.

  1. Detect and view vulnerability details. For details, see Viewing Vulnerability Details.

    Figure 1 Manually starting a vulnerability scan

  2. Fix vulnerabilities and verify the result. For details, see Handling Vulnerabilities..