Rapid7 Vulnerability & Exploit Database

Microsoft CVE-2020-1084: Connected User Experiences and Telemetry Service Denial of Service Vulnerability

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Microsoft CVE-2020-1084: Connected User Experiences and Telemetry Service Denial of Service Vulnerability

Severity
2
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:P)
Published
05/12/2020
Created
05/13/2020
Added
06/09/2020
Modified
11/18/2021

Description

A Denial Of Service vulnerability exists when Connected User Experiences and Telemetry Service fails to validate certain function values. An attacker who successfully exploited this vulnerability could deny dependent security feature functionality. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The security update addresses the vulnerability by correcting how the Connected User Experiences and Telemetry Service validates certain function values.

Solution(s)

  • msft-kb4551853-1d25cfb0-31f1-48b4-ac45-99d819a32ab7
  • msft-kb4551853-cce9dd88-2595-4168-a0ae-814612863f2b
  • msft-kb4551853-d8c58f30-4d7d-4aff-9e93-6ff2ae128f13
  • msft-kb4556799-0f2d06b0-3738-472e-8275-991c5394c2f1
  • msft-kb4556799-2e69bf96-184c-46b9-8937-306e23bdb930
  • msft-kb4556799-7f570c23-239e-430c-b403-391861eae9a3
  • msft-kb4556799-80497d7a-0a69-4f9e-805d-a8fa302967a6
  • msft-kb4556799-92289747-4a2a-48fa-9fa7-307f2f5dbcaf
  • msft-kb4556799-94cb3319-c037-4529-8187-81eaa6eaa6cd
  • msft-kb4556807-667b6b79-dad1-4ca7-9e1b-316c1ab3b620
  • msft-kb4556807-cc1b2352-a313-434e-97d9-4d5af44ebe22
  • msft-kb4556812-5bb8e7e7-a95f-4bb7-b741-1060639b133d
  • msft-kb4556812-9210cc51-b6e2-4474-999e-1b1a1de3d6dd
  • msft-kb4556813-74a79eb6-46b3-4013-a548-1c6eb7b716c4
  • msft-kb4556813-c1e8e102-1514-4e96-92fa-7175ddced36f
  • msft-kb4556813-dd423833-a95c-426e-8eb1-8105e698d2c2
  • msft-kb4556826-94eb3f6f-5f0d-47b5-ae9e-e54868948f5e
  • msft-kb4556826-ef24f377-fa00-4a2f-9e3c-b1b284b77d0d

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;