Adobe Font Manager Library Remote Code Execution Vulnerability (CVE-2020-1020/CVE-2020-0938)
A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles a specially-crafted multi-master font - Adobe Type 1 PostScript format.
For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely. For systems running Windows 10, an attacker who successfully exploited the vulnerability could execute code in an AppContainer sandbox context with limited privileges and capabilities. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
There are multiple ways an attacker could exploit the vulnerability, such as convincing a user to open a specially crafted document or viewing it in the Windows Preview pane.
Vulnerability ID
- CVE-2020-1020
- CVE-2020-0938
Vulnerability Name
Adobe Font Manager Library Remote Code Execution Vulnerability
Vulnerability Details
- For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely.
- For systems running Windows 10, an attacker who successfully exploited the vulnerability could execute code in an AppContainer sandbox context with limited privileges and capabilities. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Scope of Impact
All Windows OSs
Official Solution
It is recommended that affected users install the latest vulnerability patch as soon as possible.
For details, see https://msrc.microsoft.com/update-guide/en-us/vulnerability/CVE-2020-1020.
Suggestion
Perform the following steps to scan and fix a vulnerability.
- Detect and view vulnerability details. For details, see Viewing Vulnerability Details.
Figure 1 Manually starting a vulnerability scan
- Fix vulnerabilities and verify the result. For details, see Handling Vulnerabilities..
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.