CVE-2020-0646

9.8 CRITICAL

📋 TL;DR

CVE-2020-0646 is a remote code execution vulnerability in Microsoft .NET Framework where improper input validation allows attackers to inject and execute arbitrary code. This affects systems running vulnerable .NET Framework versions, particularly when processing untrusted XOML files in SharePoint workflows. Organizations using affected Microsoft products are at risk.

💻 Affected Systems

Products:
  • Microsoft .NET Framework
  • Microsoft SharePoint Server
Versions: .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: SharePoint Server is particularly vulnerable when processing XOML workflow files. The vulnerability requires the attacker to be able to upload or inject XOML content.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attacker to execute arbitrary code with the privileges of the application, potentially leading to data theft, ransomware deployment, or complete system takeover.

🟠

Likely Case

Remote code execution leading to unauthorized access, data exfiltration, or lateral movement within the network.

🟢

If Mitigated

Limited impact with proper network segmentation, least privilege principles, and security controls preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the ability to upload or inject XOML content into SharePoint workflows. Public proof-of-concept code exists and has been used in real attacks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: January 2020 Security Update for .NET Framework

Vendor Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0646

Restart Required: Yes

Instructions:

1. Apply the January 2020 Security Update for .NET Framework from Windows Update. 2. For SharePoint Server, apply the corresponding SharePoint security update. 3. Restart affected systems after patching.

🔧 Temporary Workarounds

Disable XOML workflow processing

windows

Prevent SharePoint from processing XOML workflow files to block the attack vector

Modify SharePoint configuration to disable XOML workflow processing

Network segmentation

all

Isolate SharePoint servers from internet and restrict internal access

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized users from uploading or modifying workflow files
  • Deploy web application firewall (WAF) rules to detect and block XOML injection attempts

🔍 How to Verify

Check if Vulnerable:

Check if .NET Framework version is within affected ranges and if January 2020 security update is not installed

Check Version:

reg query "HKLM\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full" /v Release

Verify Fix Applied:

Verify that the January 2020 .NET Framework security update is installed via Windows Update history or system information

📡 Detection & Monitoring

Log Indicators:

  • Unusual XOML file uploads to SharePoint
  • Failed workflow processing attempts
  • Suspicious PowerShell or command execution from SharePoint processes

Network Indicators:

  • Unusual outbound connections from SharePoint servers
  • Traffic patterns indicating data exfiltration

SIEM Query:

source="sharepoint" AND (event="workflow_error" OR event="file_upload") AND file_extension="xoml"

🔗 References

📤 Share & Export