Critical Patches Issued for Microsoft Products, July 14, 2020
ITS ADVISORY NUMBER:
2020-094 - UPDATED
DATE(S) ISSUED:
Tuesday, July 14, 2020
DATE UPDATED:
Friday, July 17, 2020
SUBJECT:
Critical Patches Issued for Microsoft Products, July 14, 2020
OVERVIEW:
Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution. Successful exploitation of the most severe of these vulnerabilities could result in an attacker gaining the same privileges as the logged-on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
July 17 - UPDATED OVERVIEW:
The Cybersecurity and Infrastructure Security Agency (CISA) has released Emergency Directive 20-03 addressing this as a critical vulnerability (CVE-2020-1350) affecting all versions of Windows Server with the Domain Name System (DNS) role enabled. A remote attacker could exploit this vulnerability to take control of an affected system. Malware on a system could, without user interaction, propagate to other vulnerable systems.
Although Emergency Directive 20-03 applies only to certain Executive Branch departments and agencies, CISA strongly recommends state and local governments, the private sector, and others patch this critical vulnerability as soon as possible.
THREAT INTELLIGENCE:
Critical vulnerability CVE-2020-1350 included in this roll up addresses a vulnerability in Windows Domain Name System Servers that could allow for remote code execution and is wormable.
SYSTEMS AFFECTED:
- Microsoft Windows
- Microsoft Edge (EdgeHTML-based)
- Microsoft Edge (Chromium-based) in IE Mode
- Microsoft ChakraCore
- Internet Explorer
- Microsoft Office and Microsoft Office Services and Web Apps
- Windows Defender
- Skype for Business
- Visual Studio
- Microsoft OneDrive
- Open Source Software
- .NET Framework
- Azure DevOps
RISK:
Government:
Large and medium government entities: High
Small government entities: Medium
Business:
Large and medium business entities: High
Small business entities: Medium
Home Users: Low
DESCRIPTION:
Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution.
A full list of all vulnerabilities can be found at the link located within the 'REFERENCES' section.
Successful exploitation of the most severe of these vulnerabilities could result in an attacker gaining the same privileges as the logged-on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
ACTIONS:
- After appropriate testing, immediately apply patches or mitigations provided by Microsoft to vulnerable systems.
- Run all software as a non-privileged user (one without administrative rights) to diminish the effects of a successful attack.
- Remind all users not to visit untrusted websites or follow links provided by unknown or untrusted sources.
- Inform and educate users regarding threats posed by hypertext links contained in emails or attachments especially from untrusted sources.
- Apply the Principle of Least Privilege to all systems and services.
REFERENCES:
Microsoft:
https://portal.msrc.microsoft.com/en-us/security-guidance
https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedet...
https://support.microsoft.com/en-us/help/4569509/windows-dns-server-remo...
July 17 - UPDATED REFERENCES:
CISA:
https://cyber.dhs.gov/ed/20-03/