Your review has been sent successfully

Microsoft Updates

2996
Classification
These posts contain security alerts, including digital loopholes, electronic attacks, technical updates, and they are classified base on the level of severity.

Critical

High

Medium

Low

Warning Date

Severity Level

Warning Number

Target Sector

10 June, 2020

● Critical

2020-1333

All

Description:

Microsoft has released security updates to address multiple vulnerabilities in the following products:

  • Microsoft Windows
    • Windows 10 Version 1709 for 32-bit Systems
    • Windows 10 Version 1709 for ARM64-based Systems
    • Windows 10 Version 1709 for x64-based Systems
    • Windows 10 Version 1803 for 32-bit Systems
    • Windows 10 Version 1803 for ARM64-based Systems
    • Windows 10 Version 1803 for x64-based Systems
    • Windows 10 Version 1809 for 32-bit Systems
    • Windows 10 Version 1809 for ARM64-based Systems
    • Windows 10 Version 1809 for x64-based Systems
    • Windows 10 Version 1903 for 32-bit Systems
    • Windows 10 Version 1903 for ARM64-based Systems
    • Windows 10 Version 1903 for x64-based Systems
    • Windows 10 Version 1909 for 32-bit Systems
    • Windows 10 Version 1909 for ARM64-based Systems
    • Windows 10 Version 1909 for x64-based Systems
    • Windows 10 Version 2004 for 32-bit Systems
    • Windows 10 Version 2004 for ARM64-based Systems
    • Windows 10 Version 2004 for 32-bit Systems
    • Windows 10 Version 2004 for ARM64-based Systems
    • Windows 10 Version 2004 for x64-based Systems
    • Windows 7 for 32-bit Systems Service Pack 1
    • Windows 7 for x64-based Systems Service Pack 1
    • Windows 8.1 for 32-bit systems
    • Windows 8.1 for x64-based systems
    • Windows RT 8.1
    • Windows Server 2019
    • Windows Server 2012
    • Windows Server 2016
    • Windows Server 2016 (Server Core installation)
    • Windows Server 2012 (Server Core installation)
    • Windows Server 2012 R2
    • Windows Server 2012 R2 (Server Core installation)
    • Windows Server 2019 (Server Core installation)
    • Windows Server, version 1803 (Server Core Installation)
    • Windows Server, version 1903 (Server Core installation)
    • Windows Server, version 1909 (Server Core installation)
    • Windows Server, version 2004 (Server Core installation)
    • Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1
    • Windows Server 2008 R2 for x64-based Systems Service Pack 1
    • Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
  • Microsoft Edge (EdgeHTML-based)
  • Microsoft Edge (Chromium-based) in IE Mode
  • Microsoft ChakraCore
  • Internet Explorer
    • Internet Explorer11
    • Internet Explorer9
  • Microsoft SharePoint
    • Microsoft SharePoint Enterprise Server 2013 Service Pack 1
    • Microsoft SharePoint Enterprise Server 2016
    • Microsoft SharePoint Server 2010 Service Pack 2
    • Microsoft SharePoint Server 2019
    • Microsoft SharePoint Foundation 2010 Service Pack 2
    • Microsoft SharePoint Foundation 2013 Service Pack 1
  • Microsoft Office and Microsoft Office Services and Web Apps
    • Microsoft 365 Apps for Enterprise for 32-bit Systems
    • Microsoft 365 Apps for Enterprise for 64-bit Systems
    • Microsoft Excel 2010 Service Pack 2 (32-bit editions)
    • Microsoft Excel 2010 Service Pack 2 (64-bit editions)
    • Microsoft Excel 2013 RT Service Pack 1
    • Microsoft Excel 2013 Service Pack 1 (32-bit editions)
    • Microsoft Excel 2013 Service Pack 1 (64-bit editions)
    • Microsoft Excel 2016 (32-bit edition)
    • Microsoft Excel 2016 (64-bit edition)
    • Microsoft Office 2016 for Mac
    • Microsoft Office 2019 for 32-bit editions
    • Microsoft Office 2019 for 64-bit editions
    • Microsoft Office 2019 for Mac
    • Microsoft Word 2010 Service Pack 2 (32-bit editions)
    • Microsoft Word 2010 Service Pack 2 (64-bit editions)
    • Microsoft Word 2013 RT Service Pack 1
    • Microsoft Word 2013 Service Pack 1 (32-bit editions)
    • Microsoft Word 2013 Service Pack 1 (64-bit editions)
    • Microsoft Word 2016 (32-bit edition)
    • Microsoft Word 2016 (64-bit edition)
    • Microsoft Project 2010 Service Pack 2 (32-bit editions)
    • Microsoft Project 2010 Service Pack 2 (64-bit editions)
    • Microsoft Project 2013 Service Pack 1 (32-bit editions)
    • Microsoft Project 2013 Service Pack 1 (64-bit editions)
    • Microsoft Project 2016 (32-bit edition)
    • Microsoft Project 2016 (64-bit edition)
  • Windows Defender
    • Microsoft Forefront Endpoint Protection 2010
    • Microsoft Security Essentials
    • Microsoft System Center 2012 Endpoint Protection
    • Microsoft System Center 2012 R2 Endpoint Protection
    • Microsoft System Center 2012 R2 Endpoint Protection
  • Microsoft Dynamics
  • Visual Studio
  • Azure DevOps
  • HoloLens
  • Microsoft Apps for Android
    • Microsoft Word for Android
    • Microsoft Bing Search for Android
  • Windows App Store
  • System Center
  • Android App

Threats:

An attacker could exploit these vulnerabilities by doing the following:

  • Elevation of Privilege.
  • Information disclosure.
  • Cross-site scripting (XSS) attack, which could allow the attacker to read content that the attacker is not authorized to read.
  • Remote code execution.

Best practice and Recommendations:

The CERT team encourages users to review Microsoft security advisory and apply the necessary updates:

Update instructions:

Last updated at 10 June, 2020

Rate the content

rate-icon
up icon