Microsoft Fixes 111 Vulnerabilities for Patch Tuesday

  /     /     /  
Publicated : 23/11/2024   Category : security


Microsoft Fixes 111 Vulnerabilities for Patch Tuesday


This marks the third month in a row that Microsoft patched more than 100 bugs, of which 16 are classified as critical.



Microsoft today released fixes for 111 vulnerabilities as part of its monthly Patch Tuesday rollout. Sixteen of these flaws are categorized as Critical, and 95 are classified as Important.
This month marks the third-largest Patch Tuesday update in Microsoft history, ZDNet
notes
. The company patched a whopping 115 bugs in
March
2020, its biggest release to date, and 113 in
April
. Vulnerabilities patched this month exist in Windows, the Edge browser, ChakraCore, Internet Explorer, Microsoft Office, Office Services and Web Apps, Visual Studio, Microsoft Dynamics, .NET Framework, .NET Core, and Power BI. None are publicly known or under attack.
While the absence of known vulnerabilities and zero-days gives IT managers some time to test patches before they are deployed, the size of Microsofts recent Patch Tuesday releases could be a burden. The global shift to remote work, driven by the coronavirus pandemic, has exacerbated many existing patch management
challenges
and created new ones for IT teams.
Among the serious vulnerabilities patched this month are
CVE-2020-1023
,
CVE-2020-1102
, and
CVE-2020-1024
, all critical remote code execution flaws (RCE) in Microsoft SharePoint. These could allow attackers to access a system; view, edit, or delete data; or directly run malicious code on the system. An intruder could have access to sensitive data stored in the organizations SQL server and gain a platform to conduct malicious activity against devices in the environment.
Systems like SharePoint can often be difficult to take offline and patch, allowing RCE vulnerabilities to linger in your infrastructure, explains Jay Goodman, product marketing manager for Automox. This gives attackers the ability to live off the land and move laterally easily once access is gained via an existing exploit.
Also worth noting are
CVE-2020-1117
, an RCE vulnerability in Microsoft Color Management, and
CVE-2020-1126
, a Media Foundation memory corruption vulnerability. Both are classified as Critical, and both could be exploited by tricking a user into opening a malicious attachment or visiting a website that contains the exploit code. If successful, an attacker could achieve the same rights as the compromised user and perform actions with the users permissions.
If the user has administrative privileges, the attacker could then perform a variety of actions, such as installing programs, creating a new account with full user rights, and viewing, changing, or deleting data, says Satnam Narang, staff research engineer at Tenable. However, Microsoft rates these vulnerabilities as Exploitation Less Likely, according to its Exploitability Index.
Most of the Critical flaws patched today are resolved via OS and browser updates; however, there are a number of Important CVEs with higher likelihood of exploitation. These include a pair of elevation-of-privilege vulnerabilities in Win32k (
CVE-2020-1054
and
CVE-2020-1143
), and another in Windows Graphics Component (
CVE-2020-1135
). All of these are rated Exploitation More Likely by Microsoft. An attacker who gains access to a target system could exploit any one of these flaws to execute code with elevated privileges, Narang explains.
This acknowledgement underscores an important point: Vulnerabilities with lower severity levels arent necessarily less likely to be exploited. If a businesss prioritization stops at a certain severity, or CVSS scores above a certain level, it could miss flaws an attacker is likely to use.
What is interesting and often overlooked is seven of the 10 CVEs at higher risk of exploit are only rated as Important, notes Todd Schell, senior product manager with Ivanti. It is not uncommon to look to the Critical vulnerabilities as the most concerning, but many of the vulnerabilities that end up being exploited are rated as Important vs. Critical. Risk metrics like Publicly Disclosed, Exploited, and Microsofts Exploitability Assessment should also be factored into prioritizing patches.
CVE-2020-1058
and
CVE-2020-1060
are both examples. While neither are rated as Critical in severity, its possible they will be used by attackers in the wild. Both are RCE flaws in VBScript and ranked Important. Microsoft considers both Exploitation More Likely. If exploited, these flaws could allow an attacker to gain the same rights as the current user. The versatility of VBScript lends itself to a variety of attack vectors, says Chris Hass, director of information security and research with Automox.
An attacker could host a malicious webpage with a specially crafted payload to exploit any user visiting the page using IE, inject code into a compromised webpage, or even launch a malvertising campaign to serve the payload via malicious advertisements on popular websites, says Hass. Someone could also embed an Active X control object in an application or Office file, which could be leveraged in a phishing campaign to gain code execution on a target machine.
Related Content:
6 Free Cybersecurity Training and Awareness Courses
Thunderbolt Vulnerabilities Could Threaten Millions of PCs
How Enterprises Are Developing and Maintaining Secure Applications
Companies Struggle for Effective Cybersecurity
 
 
 
Learn from industry experts in a setting that is conducive to interaction and conversation about how to prepare for that really  bad day in cybersecurity. Click for 
more information and to register

 

Last News

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security

▸ Hack Your Hotel Room ◂
Discovered: 23/12/2024
Category: security

▸ Website hacks happened during World Cup final. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Microsoft Fixes 111 Vulnerabilities for Patch Tuesday