Wednesday, January 8, 2025
HomeMicrosoftMicrosoft Released a Security Update With The Fixes for 115 Vulnerabilities that...

Microsoft Released a Security Update With The Fixes for 115 Vulnerabilities that Affects Billions of Windows Users

Published on

Microsoft released a security update for billion of Windows Users under Patch Tuesday and fixed 115 vulnerabilities that affected various Microsoft products.

The update has issued fixes including several critical vulnerabilities, and the following Microsoft products are getting a patch from this security update.

  • Microsoft Windows
  • Microsoft Edge (EdgeHTML-based)
  • Microsoft Edge (Chromium-based)
  • ChakraCore
  • Internet Explorer
  • Microsoft Exchange Server
  • Microsoft Office and Microsoft Office Services and Web Apps
  • Azure DevOps
  • Windows Defender
  • Visual Studio
  • Open Source Software
  • Azure
  • Microsoft Dynamics

Out of 115 vulnerabilities, 24 of them marked as “Critical” and 88 bugs are marked as “Important” and the rest of the 3 vulnerabilities are fixed under the “Moderate” severity category.

In the “Critical” severity category, several remote code execution vulnerabilities are fixed including Microsoft Word RCE Vulnerability(CVE-2020-0852) allows attackers to execute a crafted file and gain the current user access.

Another RCE vulnerability (CVE-2020-0824) that affected the Internet Explorer lets a remote attacker gain the admin level access and install malware; view, change, or delete data; or create new accounts with full user rights.

Microsoft also fixed a Microsoft Exchange Server cross-site-scripting (XSS)  Vulnerability(CVE-2020-0903 ) let attacker could exploit the vulnerability by sending a specially crafted request to an affected server and allowed them to read content that the attacker is not authorized.

Another LNK Remote Code Execution Vulnerability fixed that allow attackers to trigger it if a .LNK file is processed by removable drive, or remote share, that contains a malicious.LNK file and an associated malicious binary. Successful exploit this bug let attackers gain the same user rights as the local user.

“Critical” Severity Vulnerabilities

Internet ExplorerCVE-2020-0824Internet Explorer Memory Corruption Vulnerability
Microsoft BrowsersCVE-2020-0768Scripting Engine Memory Corruption Vulnerability
Microsoft DynamicsCVE-2020-0905Dynamics Business Central Remote Code Execution Vulnerability
Microsoft EdgeCVE-2020-0816Microsoft Edge Memory Corruption Vulnerability
Microsoft Graphics ComponentCVE-2020-0883GDI+ Remote Code Execution Vulnerability
Microsoft Graphics ComponentCVE-2020-0881GDI+ Remote Code Execution Vulnerability
Microsoft OfficeCVE-2020-0852Microsoft Word Remote Code Execution Vulnerability
Microsoft Scripting EngineCVE-2020-0830Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2020-0829Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2020-0826Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2020-0827Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2020-0825Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2020-0831Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2020-0811Chakra Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2020-0828Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2020-0848Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2020-0823Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2020-0812Chakra Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2020-0833Scripting Engine Memory Corruption Vulnerability
Microsoft WindowsCVE-2020-0869Media Foundation Memory Corruption Vulnerability
Microsoft WindowsCVE-2020-0809Media Foundation Memory Corruption Vulnerability
Microsoft WindowsCVE-2020-0807Media Foundation Memory Corruption Vulnerability
Microsoft WindowsCVE-2020-0684LNK Remote Code Execution Vulnerability
Microsoft WindowsCVE-2020-0801Media Foundation Memory Corruption Vulnerability

Microsoft strongly recommended installing these security updates for all the windows users to avoid the security risk and protect your Windows.

You can refer the complete patch details for the full list of vulnerabilities resolved, advisories, in the March 2020 Patch here.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Gravy Analytics Hit by Cyberattack, Hackers Allegedly Stole data

Gravy Analytics, a prominent player in location intelligence, has reportedly fallen victim to a...

Chrome Security Update – Patch for Multiple Security Vulnerabilities

Google has released an update for its Chrome web browser, advancing to version 131.0.6778.264/.265...

How Nation-State Actors and Organised Hackers Involving in Their Ways of Cyber Attacks

The distinction between nation-state actors and organized cybercriminals is becoming increasingly blurred.Both groups...

Washington State Filed Lawsuit Against T-Mobile Massive Data Breach

Washington State Attorney General Bob Ferguson filed a consumer protection lawsuit against T-Mobile for...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Chrome Security Update – Patch for Multiple Security Vulnerabilities

Google has released an update for its Chrome web browser, advancing to version 131.0.6778.264/.265...

Oracle WebLogic Vulnerability Actively Exploited in Cyber Attacks – CISA

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning regarding the active...

Hackers Weaponize Security Testing By Weaponizing npm, PyPI, & Ruby Exploit Packages

Over the past year, malicious actors have been abusing OAST services for data exfiltration,...