Friday, March 29, 2024

Microsoft Patched Actively Exploited IE Zero-Day & Other 98 Vulnerabilities that Affected 1 Billion Windows Users

Microsoft released a security update for February under Patch Tuesday with the fixes fro 99 vulnerabilities that affected various Microsoft products, including Actively exploited Internet Explorer zero-day vulnerability.

Microsoft recently achieved a big milestone of 1 billion Windows 10 users, and Microsoft issued current security updates for all the Windows 10 users.

Microsoft listed 12 vulnerabilities under “Critical” severity, 87 are listed as Important in severity out of 99 vulnerabilities.

The February security release consists of security updates for the following software:

  • Microsoft Windows
  • Microsoft Edge (EdgeHTML-based)
  • Microsoft Edge (Chromium-based)
  • ChakraCore
  • Internet Explorer
  • Microsoft Exchange Server
  • Microsoft SQL Server
  • Microsoft Office and Microsoft Office Services and Web Apps
  • Windows Malicious Software Removal Tool
  • Windows Surface Hub

This updates fixed one of the notable actively exploited internet explorer zero-day vulnerability (CVE-2020-0674) in last month that was Affected Millions of Windows Users.

Microsoft advisory said “The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. “

Most of the vulnerabilities under “CRITICAL” severity are belongs to script engine based vulnerabilities through which an attacker could host a specially crafted website that is designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website. 

Microsoft fixed a LNK Remote Code Execution Vulnerability (CVE-2020-0729 ) that exists in Microsoft Windows that could allow remote code execution if a .LNK file is processed.

An attacker will exploit the vulnerability by inserting a removal drive that contains a malicious.LNK file and an associated malicious binary, once the victims open the files in Windows Explorer the malicious binary will execute code and provide complete control of the system to the attacker.

Another RCE bugs CVE-2020-0618 and CVE-2020-0662 which are nearly identical remote code-execution (RCE) bugs in SQL Server 2012, 2014 and 2016 (32 and 64 bit) and Windows 7, 8.1, 10, Server 2008, 2012, 2016 and 2019, respectively.

two critical remote code-execution vulnerabilities in Remote Desktop (CVE-2020-0681 and CVE-2020-0734) were patched which are are likely to be exploited

Microsoft Security Update list:

CVEVulerability TypeSeverity
CVE-2020-0674Scripting Engine Memory Corruption VulnerabilityCritical
CVE-2020-0683Windows Installer Elevation of Privilege VulnerabilityImportant
CVE-2020-0686Windows Installer Elevation of Privilege VulnerabilityImportant
CVE-2020-0706Microsoft Browser Information Disclosure VulnerabilityImportant
CVE-2020-0689Microsoft Secure Boot Security Feature Bypass VulnerabilityImportant
CVE-2020-0729LNK Remote Code Execution VulnerabilityCritical
CVE-2020-0738Media Foundation Memory Corruption VulnerabilityCritical
CVE-2020-0681Remote Desktop Client Remote Code Execution VulnerabilityCritical
CVE-2020-0734Remote Desktop Client Remote Code Execution VulnerabilityCritical
CVE-2020-0673Scripting Engine Memory Corruption VulnerabilityCritical
CVE-2020-0767Scripting Engine Memory Corruption VulnerabilityCritical
CVE-2020-0710Scripting Engine Memory Corruption VulnerabilityCritical
CVE-2020-0712Scripting Engine Memory Corruption VulnerabilityCritical
CVE-2020-0713Scripting Engine Memory Corruption VulnerabilityCritical
CVE-2020-0711Scripting Engine Memory Corruption VulnerabilityCritical
CVE-2020-0662Windows Remote Code Execution VulnerabilityCritical
CVE-2020-0757Windows SSH Elevation of Privilege VulnerabilityImportant
CVE-2020-0661Windows Hyper-V Denial of Service VulnerabilityImportant
CVE-2020-0751Windows Hyper-V Denial of Service VulnerabilityImportant
CVE-2020-0660Windows Remote Desktop Protocol (RDP) Denial of Service VulnerabilityImportant
CVE-2020-0665Active Directory Elevation of Privilege VulnerabilityImportant
CVE-2020-0740Connected Devices Platform Service Elevation of Privilege VulnerabilityImportant
CVE-2020-0741Connected Devices Platform Service Elevation of Privilege VulnerabilityImportant
CVE-2020-0742Connected Devices Platform Service Elevation of Privilege VulnerabilityImportant
CVE-2020-0743Connected Devices Platform Service Elevation of Privilege VulnerabilityImportant
CVE-2020-0749Connected Devices Platform Service Elevation of Privilege VulnerabilityImportant
CVE-2020-0750Connected Devices Platform Service Elevation of Privilege VulnerabilityImportant
CVE-2020-0727Connected User Experiences and Telemetry Service Elevation of Privilege VulnerabilityImportant
CVE-2020-0709DirectX Elevation of Privilege VulnerabilityImportant
CVE-2020-0732DirectX Elevation of Privilege VulnerabilityImportant
CVE-2020-0663Microsoft Edge Elevation of Privilege VulnerabilityImportant
CVE-2020-0692Microsoft Exchange Server Elevation of Privilege VulnerabilityImportant
CVE-2020-0720Win32k Elevation of Privilege VulnerabilityImportant
CVE-2020-0721Win32k Elevation of Privilege VulnerabilityImportant
CVE-2020-0722Win32k Elevation of Privilege VulnerabilityImportant
CVE-2020-0723Win32k Elevation of Privilege VulnerabilityImportant
CVE-2020-0725Win32k Elevation of Privilege VulnerabilityImportant
CVE-2020-0726Win32k Elevation of Privilege VulnerabilityImportant
CVE-2020-0731Win32k Elevation of Privilege VulnerabilityImportant
CVE-2020-0719Win32k Elevation of Privilege VulnerabilityImportant
CVE-2020-0724Win32k Elevation of Privilege VulnerabilityImportant
CVE-2020-0691Win32k Elevation of Privilege VulnerabilityImportant
CVE-2020-0703Windows Backup Service Elevation of Privilege VulnerabilityImportant
CVE-2020-0701Windows Client License Service Elevation of Privilege VulnerabilityImportant
CVE-2020-0685Windows COM Server Elevation of Privilege VulnerabilityImportant
CVE-2020-0657Windows Common Log File System Driver Elevation of Privilege VulnerabilityImportant
CVE-2020-0747Windows Data Sharing Service Elevation of Privilege VulnerabilityImportant
CVE-2020-0659Windows Data Sharing Service Elevation of Privilege VulnerabilityImportant
CVE-2020-0737Windows Elevation of Privilege VulnerabilityImportant
CVE-2020-0739Windows Elevation of Privilege VulnerabilityImportant
CVE-2020-0753Windows Error Reporting Elevation of Privilege VulnerabilityImportant
CVE-2020-0754Windows Error Reporting Elevation of Privilege VulnerabilityImportant
CVE-2020-0678Windows Error Reporting Manager Elevation of Privilege VulnerabilityImportant
CVE-2020-0679Windows Function Discovery Service Elevation of Privilege VulnerabilityImportant
CVE-2020-0680Windows Function Discovery Service Elevation of Privilege VulnerabilityImportant
CVE-2020-0682Windows Function Discovery Service Elevation of Privilege VulnerabilityImportant
CVE-2020-0792Windows Graphics Component Elevation of Privilege VulnerabilityImportant
CVE-2020-0745Windows Graphics Component Elevation of Privilege VulnerabilityImportant
CVE-2020-0715Windows Graphics Component Elevation of Privilege VulnerabilityImportant
CVE-2020-0707Windows IME Elevation of Privilege VulnerabilityImportant
CVE-2020-0668Windows Kernel Elevation of Privilege VulnerabilityImportant
CVE-2020-0669Windows Kernel Elevation of Privilege VulnerabilityImportant
CVE-2020-0670Windows Kernel Elevation of Privilege VulnerabilityImportant
CVE-2020-0671Windows Kernel Elevation of Privilege VulnerabilityImportant
CVE-2020-0672Windows Kernel Elevation of Privilege VulnerabilityImportant
CVE-2020-0733Windows Malicious Software Removal Tool Elevation of Privilege VulnerabilityImportant
CVE-2020-0666Windows Search Indexer Elevation of Privilege VulnerabilityImportant
CVE-2020-0667Windows Search Indexer Elevation of Privilege VulnerabilityImportant
CVE-2020-0735Windows Search Indexer Elevation of Privilege VulnerabilityImportant
CVE-2020-0752Windows Search Indexer Elevation of Privilege VulnerabilityImportant
CVE-2020-0730Windows User Profile Service Elevation of Privilege VulnerabilityImportant
CVE-2020-0704Windows Wireless Network Manager Elevation of Privilege VulnerabilityImportant
CVE-2020-0714DirectX Information Disclosure VulnerabilityImportant
CVE-2020-0746Microsoft Graphics Components Information Disclosure VulnerabilityImportant
CVE-2020-0717Win32k Information Disclosure VulnerabilityImportant
CVE-2020-0716Win32k Information Disclosure VulnerabilityImportant
CVE-2020-0658Windows Common Log File System Driver Information Disclosure VulnerabilityImportant
CVE-2020-0744Windows GDI Information Disclosure VulnerabilityImportant
CVE-2020-0698Windows Information Disclosure VulnerabilityImportant
CVE-2020-0736Windows Kernel Information Disclosure VulnerabilityImportant
CVE-2020-0675Windows Key Isolation Service Information Disclosure VulnerabilityImportant
CVE-2020-0676Windows Key Isolation Service Information Disclosure VulnerabilityImportant
CVE-2020-0677Windows Key Isolation Service Information Disclosure VulnerabilityImportant
CVE-2020-0748Windows Key Isolation Service Information Disclosure VulnerabilityImportant
CVE-2020-0755Windows Key Isolation Service Information Disclosure VulnerabilityImportant
CVE-2020-0756Windows Key Isolation Service Information Disclosure VulnerabilityImportant
CVE-2020-0728Windows Modules Installer Service Information Disclosure VulnerabilityImportant
CVE-2020-0705Windows Network Driver Interface Specification (NDIS) Information Disclosure VulnerabilityImportant
CVE-2020-0759Microsoft Excel Remote Code Execution VulnerabilityImportant
CVE-2020-0688Microsoft Exchange Memory Corruption VulnerabilityImportant
CVE-2020-0618Microsoft SQL Server Reporting Services Remote Code Execution VulnerabilityImportant
CVE-2020-0655Remote Desktop Services Remote Code Execution VulnerabilityImportant
CVE-2020-0708Windows Imaging Library Remote Code Execution VulnerabilityImportant
CVE-2020-0696Microsoft Outlook Security Feature Bypass VulnerabilityImportant
CVE-2020-0702Surface Hub Security Feature Bypass VulnerabilityImportant
CVE-2020-0695Microsoft Office Online Server Spoofing VulnerabilityImportant
CVE-2020-0697Microsoft Office Tampering VulnerabilityImportant
CVE-2020-0693Microsoft Office SharePoint XSS VulnerabilityImportant
CVE-2020-0694Microsoft Office SharePoint XSS VulnerabilityImportant

Microsoft strongly recommended installing these security updates for all the windows users to avoid the security risk and protect your Windows.

You can refer the complete patch details for the full list of vulnerabilities resolved, advisories, in the Jan 2020 Patch here.

Website

Latest articles

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles