Microsoft Released Security Update For July With the Fixes of 2 Actively Exploited Zero-Day Vulnerabilities – Update Now

Microsoft Released new security update under patch Tuesday for July 2019 with the fixes of more than 70 security vulnerabilities that affected several Microsoft Products.

Microsoft’s July security patch release applied to the vulnerabilities that resides in the following Microsoft software.

  • Microsoft Windows
  • Internet Explorer
  • Microsoft Edge
  • Microsoft Office and Microsoft Office Services and Web Apps
  • Azure DevOps
  • Open Source Software
  • .NET Framework
  • Azure
  • SQL Server
  • ASP.NET
  • Visual Studio
  • Microsoft Exchange Server

Totally 77 vulnerabilities are fixed under this June security update includes, 15 critical severity and 2 actively exploited Zero-day vulnerabilities.

First Zero-day is an Elevation of Privilege Vulnerability that resides in the Win32k component due to improperly objects handle in memory.

An attacker who successfully exploits this vulnerability (CVE-2019-1132) could lead to executing the arbitrary code in kernel mode eventually take control of an affected system and the flaw reported by Anton Cherepanov, Malware Researcher of ESET.

Second zero-day is a local privilege escalation vulnerability (CVE-2019-0880) existing in the splwow64.exe when it handles specific calls. if the vulnerability exploited, an attacker could elevate privileges on an affected system from low-integrity and the vulnerability reported by Gene Yoo from ReSecurity.

Among 15 Critical Vulnerabilities, 11 vulnerabilities are based on scripting engines and browsers (Internet Explorer and Edge), rest of the 4 vulnerability affected the DHCP Server, GDI+, the .NET Framework and the Azure DevOps Server.

Microsoft also fixed the SanboxEscaper publicly disclosed Windows 10 Zero-day, a local privilege escalation vulnerability(CVE-2019-1130) that resides in the Windows AppX Deployment Service when it improperly handles hard links.

Another one of the most critical vulnerability is DHCP Server bug (CVE-2019-0785). a remote code-execution (RCE) let attacker with network access to the failover DHCP server could run arbitrary code.

In this Microsoft Security Update for July, patch applied for several other vulnerabilities including XSS, Remote Code Execution, Memory Corruption Token Authentication Bypass, Denial of Service, Spoofing, Information Disclosure, and Token Authentication Bypass.

You can refer the complete patch details for the full list of vulnerabilities resolved, advisories, in the July 2019 Patch here.

Microsoft strongly recommended installing these security updates for all the windows users to avoid the security risk and protect your Windows.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Verizon DBIR Report: Small Businesses Identified as Key Targets in Ransomware Attacks

Verizon Business's 2025 Data Breach Investigations Report (DBIR), released on April 24, 2025, paints a…

11 hours ago

Lazarus APT Targets Organizations by Exploiting One-Day Vulnerabilities

A recent cyber espionage campaign by the notorious Lazarus Advanced Persistent Threat (APT) group, tracked…

11 hours ago

ToyMaker Hackers Compromise Numerous Hosts via SSH and File Transfer Tools

In a alarming cybersecurity breach uncovered by Cisco Talos in 2023, a critical infrastructure enterprise…

11 hours ago

Threat Actors Exploiting Unsecured Kubernetes Clusters for Crypto Mining

In a startling revelation from Microsoft Threat Intelligence, threat actors are increasingly targeting unsecured Kubernetes…

11 hours ago

New Steganography Campaign Exploits MS Office Vulnerability to Distribute AsyncRAT

A recently uncovered cyberattack campaign has brought steganography back into the spotlight, showcasing the creative…

11 hours ago

Hackers Exploit Ivanti Connect Secure 0-Day to Deploy DslogdRAT and Web Shell

Threat actors exploited a zero-day vulnerability in Ivanti Connect Secure, identified as CVE-2025-0282, to deploy…

11 hours ago