Microsoft Released a Security Update With The Fixes for 115 Vulnerabilities that Affects Billions of Windows Users

Microsoft released a security update for billion of Windows Users under Patch Tuesday and fixed 115 vulnerabilities that affected various Microsoft products.

The update has issued fixes including several critical vulnerabilities, and the following Microsoft products are getting a patch from this security update.

  • Microsoft Windows
  • Microsoft Edge (EdgeHTML-based)
  • Microsoft Edge (Chromium-based)
  • ChakraCore
  • Internet Explorer
  • Microsoft Exchange Server
  • Microsoft Office and Microsoft Office Services and Web Apps
  • Azure DevOps
  • Windows Defender
  • Visual Studio
  • Open Source Software
  • Azure
  • Microsoft Dynamics

Out of 115 vulnerabilities, 24 of them marked as “Critical” and 88 bugs are marked as “Important” and the rest of the 3 vulnerabilities are fixed under the “Moderate” severity category.

In the “Critical” severity category, several remote code execution vulnerabilities are fixed including Microsoft Word RCE Vulnerability(CVE-2020-0852) allows attackers to execute a crafted file and gain the current user access.

Another RCE vulnerability (CVE-2020-0824) that affected the Internet Explorer lets a remote attacker gain the admin level access and install malware; view, change, or delete data; or create new accounts with full user rights.

Microsoft also fixed a Microsoft Exchange Server cross-site-scripting (XSS)  Vulnerability(CVE-2020-0903 ) let attacker could exploit the vulnerability by sending a specially crafted request to an affected server and allowed them to read content that the attacker is not authorized.

Another LNK Remote Code Execution Vulnerability fixed that allow attackers to trigger it if a .LNK file is processed by removable drive, or remote share, that contains a malicious.LNK file and an associated malicious binary. Successful exploit this bug let attackers gain the same user rights as the local user.

“Critical” Severity Vulnerabilities

Internet ExplorerCVE-2020-0824Internet Explorer Memory Corruption Vulnerability
Microsoft BrowsersCVE-2020-0768Scripting Engine Memory Corruption Vulnerability
Microsoft DynamicsCVE-2020-0905Dynamics Business Central Remote Code Execution Vulnerability
Microsoft EdgeCVE-2020-0816Microsoft Edge Memory Corruption Vulnerability
Microsoft Graphics ComponentCVE-2020-0883GDI+ Remote Code Execution Vulnerability
Microsoft Graphics ComponentCVE-2020-0881GDI+ Remote Code Execution Vulnerability
Microsoft OfficeCVE-2020-0852Microsoft Word Remote Code Execution Vulnerability
Microsoft Scripting EngineCVE-2020-0830Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2020-0829Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2020-0826Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2020-0827Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2020-0825Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2020-0831Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2020-0811Chakra Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2020-0828Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2020-0848Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2020-0823Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2020-0812Chakra Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2020-0833Scripting Engine Memory Corruption Vulnerability
Microsoft WindowsCVE-2020-0869Media Foundation Memory Corruption Vulnerability
Microsoft WindowsCVE-2020-0809Media Foundation Memory Corruption Vulnerability
Microsoft WindowsCVE-2020-0807Media Foundation Memory Corruption Vulnerability
Microsoft WindowsCVE-2020-0684LNK Remote Code Execution Vulnerability
Microsoft WindowsCVE-2020-0801Media Foundation Memory Corruption Vulnerability

Microsoft strongly recommended installing these security updates for all the windows users to avoid the security risk and protect your Windows.

You can refer the complete patch details for the full list of vulnerabilities resolved, advisories, in the March 2020 Patch here.

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

New WordPress Plugin That Weaponizes Legit Sites To Steal Customer Payment Data

Cybercriminals have developed PhishWP, a malicious WordPress plugin, to facilitate sophisticated phishing attacks, which enable…

2 hours ago

New FireScam Android Malware Abusing Firebase Services To Evade Detection

FireScam is multi-stage malware disguised as a fake “Telegram Premium” app that steals data and…

4 hours ago

Hackers Weaponize Security Testing By Weaponizing npm, PyPI, & Ruby Exploit Packages

Over the past year, malicious actors have been abusing OAST services for data exfiltration, C2…

4 hours ago

Hackers Mimic Social Security Administration To Deliver ConnectWise RAT

A phishing campaign spoofing the United States Social Security Administration emerged in September 2024, delivering…

4 hours ago

EAGERBEE Malware Updated It’s Arsenal With Payloads & Command Shells

The Kaspersky researchers investigation into the EAGERBEE backdoor revealed its deployment within Middle Eastern ISPs…

5 hours ago

CyTwist Launches Advanced Security Solution to Identify AI-Driven Cyber Threats in Minutes

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine…

6 hours ago