{"id":10078,"date":"2020-03-03T01:59:05","date_gmt":"2020-03-03T01:59:05","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=10078"},"modified":"2026-04-17T18:07:50","modified_gmt":"2026-04-17T18:07:50","slug":"microsoft-sql-server-remote-code-execution-vulnerability-cve-2020-0618-threat-alert","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/microsoft-sql-server-remote-code-execution-vulnerability-cve-2020-0618-threat-alert\/","title":{"rendered":"Microsoft SQL Server Remote Code Execution Vulnerability (CVE-2020-0618) Threat Alert"},"content":{"rendered":"<p><!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\"><br \/>\n<html><body><\/p>\n<h2><strong><a name=\"_Toc130115382\"><\/a>Vulnerability Description<\/strong><\/h2>\n<p>On February 12, Microsoft released a security update to announce the fix of the remote code execution vulnerability (CVE-2020-0618) in Microsoft SQL Server Reporting Services. SQL Server, developed by Microsoft, is a relational database management system (RDBMS) that is widely used in the world.<!--more--><\/p>\n<p>An attacker gaining low privileges could exploit this vulnerability to execute arbitrary cod in the context of the Report Server service account by sending a carefully crafted request to an affected Reporting Services instance of an affected SQL Server. Currently, the proof of concept (PoC) of this vulnerability is already publicly available. Affected users should apply the related security update for protection.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/02\/0303-1.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-10079\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/02\/0303-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"567\" height=\"125\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/02\/0303-1.jpg 567w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/02\/0303-1-300x66.jpg 300w\" sizes=\"(max-width: 567px) 100vw, 567px\" \/><\/a><\/p>\n<p>For details of this vulnerability, visit the following link:<\/p>\n<p>https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2020-0618<\/p>\n<p>Scope of Impact<\/p>\n<h2><strong>Affected Versions<\/strong><\/h2>\n<ul>\n<li>SQL Server 2012 for 32-bit Systems Service Pack 4 (QFE)<\/li>\n<li>SQL Server 2012 for x64-based Systems Service Pack 4 (QFE)<\/li>\n<li>SQL Server 2014 Service Pack 3 for 32-bit Systems (CU)<\/li>\n<li>SQL Server 2014 Service Pack 3 for 32-bit Systems (GDR)<\/li>\n<li>SQL Server 2014 Service Pack 3 for x64-based Systems (CU)<\/li>\n<li>SQL Server 2014 Service Pack 3 for x64-based Systems (GDR)<\/li>\n<li>SQL Server 2016 for x64-based Systems Service Pack 2 (CU)<\/li>\n<li>SQL Server 2016 for x64-based Systems Service Pack 2 (GDR)<\/li>\n<\/ul>\n<p>Note: For version details and update download links, see the appendix.<\/p>\n<h2><strong>Mitigation<\/strong><\/h2>\n<ul>\n<li><strong>Patch installation<\/strong><\/li>\n<\/ul>\n<p>Currently, Microsoft has released security updates to fix this vulnerability in system versions supported by Microsoft. Affected users should apply these updates as soon as possible for protection. These updates are available at the following link:<\/p>\n<p>https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2020-0618<\/p>\n<p>For more information on determining your SQL Server version number, see a Microsoft Knowledge Base Article from the following link:<\/p>\n<p>https:\/\/support.microsoft.com\/en-us\/help\/321185\/how-to-determine-the-version-edition-and-update-level-of-sql-server-an<\/p>\n<ul>\n<li><strong>Mitigations<\/strong><\/li>\n<\/ul>\n<p>As an attacker could encode a request packet to bypass the web application firewall, users are strongly advised to install security updates as soon as possible. Besides, anonymous access should be prohibited to make sure that only authenticated users can access related applications. If you suspect your server is vulnerable, in addition to update installation, change your password for login to the server to prevent attackers from exploiting it.<\/p>\n<p>Appendix: Versions and Patches<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"73\"><strong>Update Number<\/strong><\/td>\n<td width=\"113\"><strong>Product<\/strong><\/td>\n<td width=\"98\"><strong>Apply If Current Product Version Is &acirc;&euro;&brvbar;<\/strong><\/td>\n<td width=\"297\"><strong>Patch Download Link<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"73\">4532097<\/td>\n<td width=\"113\">SQL Server 2016 Service Pack 2 (GDR)<\/td>\n<td width=\"98\">13.0.5026.0 &#8211; 13.0.5101.9<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/td>\n<td width=\"297\">https:\/\/download.microsoft.com\/download\/6\/d\/8\/6d8acd3e-e624-4256-8265-07c39b25e9ad\/SQLServer2016-KB4532097-x64.exe<\/td>\n<\/tr>\n<tr>\n<td width=\"73\">4535706<\/td>\n<td width=\"113\">SQL Server 2016 Service Pack 2 CU11<\/td>\n<td width=\"98\">13.0.5149.0 &#8211; 13.0.5598.27<\/td>\n<td width=\"297\">https:\/\/download.microsoft.com\/download\/9\/f\/a\/9fa97512-ff9b-466a-918e-d95214fbfceb\/SQLServer2016-KB4535706-x64.exe<\/td>\n<\/tr>\n<tr>\n<td width=\"73\">4532095<\/td>\n<td width=\"113\">SQL Server 2014 Service Pack 3 for 64-bit Systems (GDR)<\/td>\n<td width=\"98\">12.0.6024.0 &#8211; 12.0.6108.1<\/td>\n<td width=\"297\">https:\/\/download.microsoft.com\/download\/2\/d\/d\/2ddc7094-0c7a-40b0-accf-07a5f57e0040\/SQLServer2014-KB4532095-x64.exe<\/td>\n<\/tr>\n<tr>\n<td width=\"73\">4532095<\/td>\n<td width=\"113\">SQL Server 2014 Service Pack 3 for 32-bit Systems (GDR)<\/td>\n<td width=\"98\">12.0.6024.0 &#8211; 12.0.6108.1<\/td>\n<td width=\"297\">https:\/\/download.microsoft.com\/download\/2\/d\/d\/2ddc7094-0c7a-40b0-accf-07a5f57e0040\/SQLServer2014-KB4532095-x86.exe<\/td>\n<\/tr>\n<tr>\n<td width=\"73\">4535288<\/td>\n<td width=\"113\">SQL Server 2014 Service Pack 2 CU4<\/td>\n<td width=\"98\">12.0.6205.1 &#8211; 12.0.6329.1<\/td>\n<td width=\"297\">https:\/\/download.microsoft.com\/download\/4\/b\/6\/4b623928-0e26-4e4f-9d31-9974af8ac8ba\/SQLServer2014-KB4535288-x64.exe<\/td>\n<\/tr>\n<tr>\n<td width=\"73\">4535288<\/td>\n<td width=\"113\">SQL Server 2014 Service Pack 3 for 32-bit Systems (CU)<\/td>\n<td width=\"98\">12.0.6205.1 &#8211; 12.0.6329.1<\/td>\n<td width=\"297\">https:\/\/download.microsoft.com\/download\/4\/b\/6\/4b623928-0e26-4e4f-9d31-9974af8ac8ba\/SQLServer2014-KB4535288-x86.exe<\/td>\n<\/tr>\n<tr>\n<td width=\"73\">4532098<\/td>\n<td width=\"113\">SQL Server 2012 for 64-bit Systems Service Pack 4 (QFE)<\/td>\n<td width=\"98\">111.0.7001.0 &#8211; 11.0.7462.6<\/td>\n<td width=\"297\">https:\/\/download.microsoft.com\/download\/5\/6\/b\/56bfd2a1-48db-434a-9572-4d8dbf7ef047\/SQLServer2012-KB4532098-x64.exe<\/td>\n<\/tr>\n<tr>\n<td width=\"73\">4532098<\/td>\n<td width=\"113\">SQL Server 2012 for 32-bit Systems Service Pack 4 (QFE)<\/td>\n<td width=\"98\">111.0.7001.0 &#8211; 11.0.7462.6<\/td>\n<td width=\"297\">https:\/\/download.microsoft.com\/download\/5\/6\/b\/56bfd2a1-48db-434a-9572-4d8dbf7ef047\/SQLServer2012-KB4532098-x86.exe<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>Note: If your SQL Server version number is not represented in the table above, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.<\/p>\n<h2><strong>Statement<\/strong><\/h2>\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n<h2><strong>About NSFOCUS<\/strong><\/h2>\n<p>Founded in April 2000, NSFOCUS Information Technology Co., Ltd. (NSFOCUS) was headquartered in Beijing. With more than 30 branches and subsidiaries at home and abroad, the company provides most competitive security products and solutions for governments, carriers, and financial, energy, Internet, education, and medical sectors, ensuring customers&#8217; business continuity.<\/p>\n<p>Based on years of research in security assurance, NSFOCUS has set foot in network and terminal security, Internet infrastructure security, and compliance and security management. The company provides the intrusion detection\/prevention system, anti-DDoS system, remote security assessment system, and web security protection products as well as professional security services for customers.<\/p>\n<p>NSFOCUS Information Technology Co., Ltd. started trading its shares at China&#8217;s Nasdaq-style market, ChiNext, in Shenzhen on January 29, 2014, with the name of NSFOCUS and code of 300369.<\/body><\/html><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Vulnerability Description On February 12, Microsoft released a security update to announce the fix of the remote code execution vulnerability (CVE-2020-0618) in Microsoft SQL Server Reporting Services. SQL Server, developed by Microsoft, is a relational database management system (RDBMS) that is widely used in the world.<\/p>\n","protected":false},"author":1,"featured_media":9380,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[6],"tags":[521],"class_list":["post-10078","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-emergency-response","tag-microsoft-sql-server"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft SQL Server Remote Code Execution Vulnerability (CVE-2020-0618) Threat Alert - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nsfocusglobal.com\/microsoft-sql-server-remote-code-execution-vulnerability-cve-2020-0618-threat-alert\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft SQL Server Remote Code Execution Vulnerability (CVE-2020-0618) Threat Alert - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Vulnerability Description On February 12, Microsoft released a security update to announce the fix of the remote code execution vulnerability\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/microsoft-sql-server-remote-code-execution-vulnerability-cve-2020-0618-threat-alert\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-03T01:59:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0925-1.jpg\" \/>\n<meta name=\"author\" content=\"NSFOCUS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Microsoft SQL Server Remote Code Execution Vulnerability (CVE-2020-0618) Threat Alert - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Vulnerability Description On February 12, Microsoft released a security update to announce the fix of the remote code execution vulnerability\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0925-1.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"NSFOCUS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsoft-sql-server-remote-code-execution-vulnerability-cve-2020-0618-threat-alert\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsoft-sql-server-remote-code-execution-vulnerability-cve-2020-0618-threat-alert\\\/\"},\"author\":{\"name\":\"NSFOCUS\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Microsoft SQL Server Remote Code Execution Vulnerability (CVE-2020-0618) Threat Alert\",\"datePublished\":\"2020-03-03T01:59:05+00:00\",\"dateModified\":\"2026-04-17T18:07:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsoft-sql-server-remote-code-execution-vulnerability-cve-2020-0618-threat-alert\\\/\"},\"wordCount\":873,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsoft-sql-server-remote-code-execution-vulnerability-cve-2020-0618-threat-alert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/0925-1.jpg\",\"keywords\":[\"Microsoft SQL Server\"],\"articleSection\":[\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/microsoft-sql-server-remote-code-execution-vulnerability-cve-2020-0618-threat-alert\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsoft-sql-server-remote-code-execution-vulnerability-cve-2020-0618-threat-alert\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsoft-sql-server-remote-code-execution-vulnerability-cve-2020-0618-threat-alert\\\/\",\"name\":\"Microsoft SQL Server Remote Code Execution Vulnerability (CVE-2020-0618) Threat Alert - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsoft-sql-server-remote-code-execution-vulnerability-cve-2020-0618-threat-alert\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsoft-sql-server-remote-code-execution-vulnerability-cve-2020-0618-threat-alert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/0925-1.jpg\",\"datePublished\":\"2020-03-03T01:59:05+00:00\",\"dateModified\":\"2026-04-17T18:07:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsoft-sql-server-remote-code-execution-vulnerability-cve-2020-0618-threat-alert\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/microsoft-sql-server-remote-code-execution-vulnerability-cve-2020-0618-threat-alert\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsoft-sql-server-remote-code-execution-vulnerability-cve-2020-0618-threat-alert\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/0925-1.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/0925-1.jpg\",\"width\":554,\"height\":296,\"caption\":\"Blue Windows logo with light beams.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsoft-sql-server-remote-code-execution-vulnerability-cve-2020-0618-threat-alert\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft SQL Server Remote Code Execution Vulnerability (CVE-2020-0618) Threat Alert\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"NSFOCUS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"NSFOCUS\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft SQL Server Remote Code Execution Vulnerability (CVE-2020-0618) Threat Alert - NSFOCUS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nsfocusglobal.com\/microsoft-sql-server-remote-code-execution-vulnerability-cve-2020-0618-threat-alert\/","og_locale":"pt_BR","og_type":"article","og_title":"Microsoft SQL Server Remote Code Execution Vulnerability (CVE-2020-0618) Threat Alert - NSFOCUS","og_description":"Vulnerability Description On February 12, Microsoft released a security update to announce the fix of the remote code execution vulnerability","og_url":"https:\/\/nsfocusglobal.com\/microsoft-sql-server-remote-code-execution-vulnerability-cve-2020-0618-threat-alert\/","og_site_name":"NSFOCUS","article_published_time":"2020-03-03T01:59:05+00:00","article_modified_time":"2026-04-17T18:07:50+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0925-1.jpg","type":"","width":"","height":""}],"author":"NSFOCUS","twitter_card":"summary_large_image","twitter_title":"Microsoft SQL Server Remote Code Execution Vulnerability (CVE-2020-0618) Threat Alert - NSFOCUS","twitter_description":"Vulnerability Description On February 12, Microsoft released a security update to announce the fix of the remote code execution vulnerability","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0925-1.jpg","twitter_misc":{"Escrito por":"NSFOCUS","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/microsoft-sql-server-remote-code-execution-vulnerability-cve-2020-0618-threat-alert\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/microsoft-sql-server-remote-code-execution-vulnerability-cve-2020-0618-threat-alert\/"},"author":{"name":"NSFOCUS","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Microsoft SQL Server Remote Code Execution Vulnerability (CVE-2020-0618) Threat Alert","datePublished":"2020-03-03T01:59:05+00:00","dateModified":"2026-04-17T18:07:50+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/microsoft-sql-server-remote-code-execution-vulnerability-cve-2020-0618-threat-alert\/"},"wordCount":873,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/microsoft-sql-server-remote-code-execution-vulnerability-cve-2020-0618-threat-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0925-1.jpg","keywords":["Microsoft SQL Server"],"articleSection":["Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/microsoft-sql-server-remote-code-execution-vulnerability-cve-2020-0618-threat-alert\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/microsoft-sql-server-remote-code-execution-vulnerability-cve-2020-0618-threat-alert\/","url":"https:\/\/nsfocusglobal.com\/microsoft-sql-server-remote-code-execution-vulnerability-cve-2020-0618-threat-alert\/","name":"Microsoft SQL Server Remote Code Execution Vulnerability (CVE-2020-0618) Threat Alert - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/microsoft-sql-server-remote-code-execution-vulnerability-cve-2020-0618-threat-alert\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/microsoft-sql-server-remote-code-execution-vulnerability-cve-2020-0618-threat-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0925-1.jpg","datePublished":"2020-03-03T01:59:05+00:00","dateModified":"2026-04-17T18:07:50+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/microsoft-sql-server-remote-code-execution-vulnerability-cve-2020-0618-threat-alert\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/microsoft-sql-server-remote-code-execution-vulnerability-cve-2020-0618-threat-alert\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/microsoft-sql-server-remote-code-execution-vulnerability-cve-2020-0618-threat-alert\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0925-1.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0925-1.jpg","width":554,"height":296,"caption":"Blue Windows logo with light beams."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/microsoft-sql-server-remote-code-execution-vulnerability-cve-2020-0618-threat-alert\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Microsoft SQL Server Remote Code Execution Vulnerability (CVE-2020-0618) Threat Alert"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/#website","url":"https:\/\/nsfocusglobal.com\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"NSFOCUS","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"NSFOCUS"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/10078","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=10078"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/10078\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/9380"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=10078"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=10078"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=10078"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}