The company: It is remotely exploitable without authentication, letting remote attacker to take control of an affected system. Patch the CVE-2020-14750 now!
The researcher Steven Seeley: It’s due to improper validation of cmdlet arguments. Exploitation requires an authenticated user in a certain role. Patches have been released.
They are the CVE-2020-1425 and the CVE-2020-1457, and affects Library on several Windows 10 and Windows Server versions. Up to date, there aren’t any alternative mitigating measures.
The CVE-2020-0796 affected the Server Message Block 3.1.1 (SMBv3). It could enable remote and arbitrary code execution, potentially taking control of the system. Moreover, it was wormable.
Nine of them were “Critical”, the others “Important” or “Moderate”. The first could allow an attacker to take control of an affected system, thanks to RCS. UPDATE the systems now!