Monday, November 25, 2024
HomeMicrosoftMicrosoft Patched Actively Exploited IE Zero-Day & Other 98 Vulnerabilities that Affected...

Microsoft Patched Actively Exploited IE Zero-Day & Other 98 Vulnerabilities that Affected 1 Billion Windows Users

Published on

Microsoft released a security update for February under Patch Tuesday with the fixes fro 99 vulnerabilities that affected various Microsoft products, including Actively exploited Internet Explorer zero-day vulnerability.

Microsoft recently achieved a big milestone of 1 billion Windows 10 users, and Microsoft issued current security updates for all the Windows 10 users.

Microsoft listed 12 vulnerabilities under “Critical” severity, 87 are listed as Important in severity out of 99 vulnerabilities.

- Advertisement - SIEM as a Service

The February security release consists of security updates for the following software:

  • Microsoft Windows
  • Microsoft Edge (EdgeHTML-based)
  • Microsoft Edge (Chromium-based)
  • ChakraCore
  • Internet Explorer
  • Microsoft Exchange Server
  • Microsoft SQL Server
  • Microsoft Office and Microsoft Office Services and Web Apps
  • Windows Malicious Software Removal Tool
  • Windows Surface Hub

This updates fixed one of the notable actively exploited internet explorer zero-day vulnerability (CVE-2020-0674) in last month that was Affected Millions of Windows Users.

Microsoft advisory said “The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. “

Most of the vulnerabilities under “CRITICAL” severity are belongs to script engine based vulnerabilities through which an attacker could host a specially crafted website that is designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website. 

Microsoft fixed a LNK Remote Code Execution Vulnerability (CVE-2020-0729 ) that exists in Microsoft Windows that could allow remote code execution if a .LNK file is processed.

An attacker will exploit the vulnerability by inserting a removal drive that contains a malicious.LNK file and an associated malicious binary, once the victims open the files in Windows Explorer the malicious binary will execute code and provide complete control of the system to the attacker.

Another RCE bugs CVE-2020-0618 and CVE-2020-0662 which are nearly identical remote code-execution (RCE) bugs in SQL Server 2012, 2014 and 2016 (32 and 64 bit) and Windows 7, 8.1, 10, Server 2008, 2012, 2016 and 2019, respectively.

two critical remote code-execution vulnerabilities in Remote Desktop (CVE-2020-0681 and CVE-2020-0734) were patched which are are likely to be exploited

Microsoft Security Update list:

CVEVulerability TypeSeverity
CVE-2020-0674Scripting Engine Memory Corruption VulnerabilityCritical
CVE-2020-0683Windows Installer Elevation of Privilege VulnerabilityImportant
CVE-2020-0686Windows Installer Elevation of Privilege VulnerabilityImportant
CVE-2020-0706Microsoft Browser Information Disclosure VulnerabilityImportant
CVE-2020-0689Microsoft Secure Boot Security Feature Bypass VulnerabilityImportant
CVE-2020-0729LNK Remote Code Execution VulnerabilityCritical
CVE-2020-0738Media Foundation Memory Corruption VulnerabilityCritical
CVE-2020-0681Remote Desktop Client Remote Code Execution VulnerabilityCritical
CVE-2020-0734Remote Desktop Client Remote Code Execution VulnerabilityCritical
CVE-2020-0673Scripting Engine Memory Corruption VulnerabilityCritical
CVE-2020-0767Scripting Engine Memory Corruption VulnerabilityCritical
CVE-2020-0710Scripting Engine Memory Corruption VulnerabilityCritical
CVE-2020-0712Scripting Engine Memory Corruption VulnerabilityCritical
CVE-2020-0713Scripting Engine Memory Corruption VulnerabilityCritical
CVE-2020-0711Scripting Engine Memory Corruption VulnerabilityCritical
CVE-2020-0662Windows Remote Code Execution VulnerabilityCritical
CVE-2020-0757Windows SSH Elevation of Privilege VulnerabilityImportant
CVE-2020-0661Windows Hyper-V Denial of Service VulnerabilityImportant
CVE-2020-0751Windows Hyper-V Denial of Service VulnerabilityImportant
CVE-2020-0660Windows Remote Desktop Protocol (RDP) Denial of Service VulnerabilityImportant
CVE-2020-0665Active Directory Elevation of Privilege VulnerabilityImportant
CVE-2020-0740Connected Devices Platform Service Elevation of Privilege VulnerabilityImportant
CVE-2020-0741Connected Devices Platform Service Elevation of Privilege VulnerabilityImportant
CVE-2020-0742Connected Devices Platform Service Elevation of Privilege VulnerabilityImportant
CVE-2020-0743Connected Devices Platform Service Elevation of Privilege VulnerabilityImportant
CVE-2020-0749Connected Devices Platform Service Elevation of Privilege VulnerabilityImportant
CVE-2020-0750Connected Devices Platform Service Elevation of Privilege VulnerabilityImportant
CVE-2020-0727Connected User Experiences and Telemetry Service Elevation of Privilege VulnerabilityImportant
CVE-2020-0709DirectX Elevation of Privilege VulnerabilityImportant
CVE-2020-0732DirectX Elevation of Privilege VulnerabilityImportant
CVE-2020-0663Microsoft Edge Elevation of Privilege VulnerabilityImportant
CVE-2020-0692Microsoft Exchange Server Elevation of Privilege VulnerabilityImportant
CVE-2020-0720Win32k Elevation of Privilege VulnerabilityImportant
CVE-2020-0721Win32k Elevation of Privilege VulnerabilityImportant
CVE-2020-0722Win32k Elevation of Privilege VulnerabilityImportant
CVE-2020-0723Win32k Elevation of Privilege VulnerabilityImportant
CVE-2020-0725Win32k Elevation of Privilege VulnerabilityImportant
CVE-2020-0726Win32k Elevation of Privilege VulnerabilityImportant
CVE-2020-0731Win32k Elevation of Privilege VulnerabilityImportant
CVE-2020-0719Win32k Elevation of Privilege VulnerabilityImportant
CVE-2020-0724Win32k Elevation of Privilege VulnerabilityImportant
CVE-2020-0691Win32k Elevation of Privilege VulnerabilityImportant
CVE-2020-0703Windows Backup Service Elevation of Privilege VulnerabilityImportant
CVE-2020-0701Windows Client License Service Elevation of Privilege VulnerabilityImportant
CVE-2020-0685Windows COM Server Elevation of Privilege VulnerabilityImportant
CVE-2020-0657Windows Common Log File System Driver Elevation of Privilege VulnerabilityImportant
CVE-2020-0747Windows Data Sharing Service Elevation of Privilege VulnerabilityImportant
CVE-2020-0659Windows Data Sharing Service Elevation of Privilege VulnerabilityImportant
CVE-2020-0737Windows Elevation of Privilege VulnerabilityImportant
CVE-2020-0739Windows Elevation of Privilege VulnerabilityImportant
CVE-2020-0753Windows Error Reporting Elevation of Privilege VulnerabilityImportant
CVE-2020-0754Windows Error Reporting Elevation of Privilege VulnerabilityImportant
CVE-2020-0678Windows Error Reporting Manager Elevation of Privilege VulnerabilityImportant
CVE-2020-0679Windows Function Discovery Service Elevation of Privilege VulnerabilityImportant
CVE-2020-0680Windows Function Discovery Service Elevation of Privilege VulnerabilityImportant
CVE-2020-0682Windows Function Discovery Service Elevation of Privilege VulnerabilityImportant
CVE-2020-0792Windows Graphics Component Elevation of Privilege VulnerabilityImportant
CVE-2020-0745Windows Graphics Component Elevation of Privilege VulnerabilityImportant
CVE-2020-0715Windows Graphics Component Elevation of Privilege VulnerabilityImportant
CVE-2020-0707Windows IME Elevation of Privilege VulnerabilityImportant
CVE-2020-0668Windows Kernel Elevation of Privilege VulnerabilityImportant
CVE-2020-0669Windows Kernel Elevation of Privilege VulnerabilityImportant
CVE-2020-0670Windows Kernel Elevation of Privilege VulnerabilityImportant
CVE-2020-0671Windows Kernel Elevation of Privilege VulnerabilityImportant
CVE-2020-0672Windows Kernel Elevation of Privilege VulnerabilityImportant
CVE-2020-0733Windows Malicious Software Removal Tool Elevation of Privilege VulnerabilityImportant
CVE-2020-0666Windows Search Indexer Elevation of Privilege VulnerabilityImportant
CVE-2020-0667Windows Search Indexer Elevation of Privilege VulnerabilityImportant
CVE-2020-0735Windows Search Indexer Elevation of Privilege VulnerabilityImportant
CVE-2020-0752Windows Search Indexer Elevation of Privilege VulnerabilityImportant
CVE-2020-0730Windows User Profile Service Elevation of Privilege VulnerabilityImportant
CVE-2020-0704Windows Wireless Network Manager Elevation of Privilege VulnerabilityImportant
CVE-2020-0714DirectX Information Disclosure VulnerabilityImportant
CVE-2020-0746Microsoft Graphics Components Information Disclosure VulnerabilityImportant
CVE-2020-0717Win32k Information Disclosure VulnerabilityImportant
CVE-2020-0716Win32k Information Disclosure VulnerabilityImportant
CVE-2020-0658Windows Common Log File System Driver Information Disclosure VulnerabilityImportant
CVE-2020-0744Windows GDI Information Disclosure VulnerabilityImportant
CVE-2020-0698Windows Information Disclosure VulnerabilityImportant
CVE-2020-0736Windows Kernel Information Disclosure VulnerabilityImportant
CVE-2020-0675Windows Key Isolation Service Information Disclosure VulnerabilityImportant
CVE-2020-0676Windows Key Isolation Service Information Disclosure VulnerabilityImportant
CVE-2020-0677Windows Key Isolation Service Information Disclosure VulnerabilityImportant
CVE-2020-0748Windows Key Isolation Service Information Disclosure VulnerabilityImportant
CVE-2020-0755Windows Key Isolation Service Information Disclosure VulnerabilityImportant
CVE-2020-0756Windows Key Isolation Service Information Disclosure VulnerabilityImportant
CVE-2020-0728Windows Modules Installer Service Information Disclosure VulnerabilityImportant
CVE-2020-0705Windows Network Driver Interface Specification (NDIS) Information Disclosure VulnerabilityImportant
CVE-2020-0759Microsoft Excel Remote Code Execution VulnerabilityImportant
CVE-2020-0688Microsoft Exchange Memory Corruption VulnerabilityImportant
CVE-2020-0618Microsoft SQL Server Reporting Services Remote Code Execution VulnerabilityImportant
CVE-2020-0655Remote Desktop Services Remote Code Execution VulnerabilityImportant
CVE-2020-0708Windows Imaging Library Remote Code Execution VulnerabilityImportant
CVE-2020-0696Microsoft Outlook Security Feature Bypass VulnerabilityImportant
CVE-2020-0702Surface Hub Security Feature Bypass VulnerabilityImportant
CVE-2020-0695Microsoft Office Online Server Spoofing VulnerabilityImportant
CVE-2020-0697Microsoft Office Tampering VulnerabilityImportant
CVE-2020-0693Microsoft Office SharePoint XSS VulnerabilityImportant
CVE-2020-0694Microsoft Office SharePoint XSS VulnerabilityImportant

Microsoft strongly recommended installing these security updates for all the windows users to avoid the security risk and protect your Windows.

You can refer the complete patch details for the full list of vulnerabilities resolved, advisories, in the Jan 2020 Patch here.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Microsoft Ignite New 360-Degree Details Attackers Tools & Methods

A significant leap forward in cybersecurity was announced with the introduction of new threat...

GeoVision 0-Day Vulnerability Exploited in the Wild

Cybersecurity researchers have detected the active exploitation of a zero-day vulnerability in GeoVision devices,...

Windows 0-Day Exploited in Wild with Single Right Click

A newly discovered zero-day vulnerability, CVE-2024-43451, has been actively exploited in the wild, targeting Windows...