Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

06:10 PM
Connect Directly

Microsoft Fixes 111 Vulnerabilities for Patch Tuesday

This marks the third month in a row that Microsoft patched more than 100 bugs, of which 16 are classified as critical.

Microsoft today released fixes for 111 vulnerabilities as part of its monthly Patch Tuesday rollout. Sixteen of these flaws are categorized as Critical, and 95 are classified as Important.

This month marks the third-largest Patch Tuesday update in Microsoft history, ZDNet notes. The company patched a whopping 115 bugs in March 2020, its biggest release to date, and 113 in April. Vulnerabilities patched this month exist in Windows, the Edge browser, ChakraCore, Internet Explorer, Microsoft Office, Office Services and Web Apps, Visual Studio, Microsoft Dynamics, .NET Framework, .NET Core, and Power BI. None are publicly known or under attack.

While the absence of known vulnerabilities and zero-days gives IT managers some time to test patches before they are deployed, the size of Microsoft's recent Patch Tuesday releases could be a burden. The global shift to remote work, driven by the coronavirus pandemic, has exacerbated many existing patch management challenges and created new ones for IT teams.

Among the serious vulnerabilities patched this month are CVE-2020-1023, CVE-2020-1102, and CVE-2020-1024, all critical remote code execution flaws (RCE) in Microsoft SharePoint. These could allow attackers to access a system; view, edit, or delete data; or directly run malicious code on the system. An intruder could have access to sensitive data stored in the organization's SQL server and gain a platform to conduct malicious activity against devices in the environment.

"Systems like SharePoint can often be difficult to take offline and patch, allowing RCE vulnerabilities to linger in your infrastructure," explains Jay Goodman, product marketing manager for Automox. "This gives attackers the ability to 'live off the land' and move laterally easily once access is gained via an existing exploit."

Also worth noting are CVE-2020-1117, an RCE vulnerability in Microsoft Color Management, and CVE-2020-1126, a Media Foundation memory corruption vulnerability. Both are classified as Critical, and both could be exploited by tricking a user into opening a malicious attachment or visiting a website that contains the exploit code. If successful, an attacker could achieve the same rights as the compromised user and perform actions with the user's permissions.

"If the user has administrative privileges, the attacker could then perform a variety of actions, such as installing programs, creating a new account with full user rights, and viewing, changing, or deleting data," says Satnam Narang, staff research engineer at Tenable. "However, Microsoft rates these vulnerabilities as 'Exploitation Less Likely,' according to its Exploitability Index."

Most of the Critical flaws patched today are resolved via OS and browser updates; however, there are a number of Important CVEs with higher likelihood of exploitation. These include a pair of elevation-of-privilege vulnerabilities in Win32k (CVE-2020-1054 and CVE-2020-1143), and another in Windows Graphics Component (CVE-2020-1135). All of these are rated Exploitation More Likely by Microsoft. An attacker who gains access to a target system could exploit any one of these flaws to execute code with elevated privileges, Narang explains.

This acknowledgement underscores an important point: Vulnerabilities with lower severity levels aren't necessarily less likely to be exploited. If a business's prioritization stops at a certain severity, or CVSS scores above a certain level, it could miss flaws an attacker is likely to use.

"What is interesting and often overlooked is seven of the 10 CVEs at higher risk of exploit are only rated as Important," notes Todd Schell, senior product manager with Ivanti. "It is not uncommon to look to the Critical vulnerabilities as the most concerning, but many of the vulnerabilities that end up being exploited are rated as Important vs. Critical." Risk metrics like Publicly Disclosed, Exploited, and Microsoft's Exploitability Assessment should also be factored into prioritizing patches.

CVE-2020-1058 and CVE-2020-1060 are both examples. While neither are rated as Critical in severity, it's possible they will be used by attackers in the wild. Both are RCE flaws in VBScript and ranked Important. Microsoft considers both "Exploitation More Likely." If exploited, these flaws could allow an attacker to gain the same rights as the current user. The versatility of VBScript lends itself to a variety of attack vectors, says Chris Hass, director of information security and research with Automox.

"An attacker could host a malicious webpage with a specially crafted payload to exploit any user visiting the page using IE, inject code into a compromised webpage, or even launch a malvertising campaign to serve the payload via malicious advertisements on popular websites," says Hass. Someone could also embed an Active X control object in an application or Office file, which could be leveraged in a phishing campaign to gain code execution on a target machine.

Related Content:


Learn from industry experts in a setting that is conducive to interaction and conversation about how to prepare for that "really  bad day" in cybersecurity. Click for more information and to register
Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-15
A XSS Vulnerability in /uploads/dede/action_search.php in DedeCMS V5.7 SP2 allows an authenticated user to execute remote arbitrary code via the keyword parameter.
PUBLISHED: 2021-05-15
DedeCMS V5.7 SP2 contains a CSRF vulnerability that allows a remote attacker to send a malicious request to to the web manager allowing remote code execution.
PUBLISHED: 2021-05-14
The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.
PUBLISHED: 2021-05-14
In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.
PUBLISHED: 2021-05-14
The block subsystem in the Linux kernel before 5.2 has a use-after-free that can lead to arbitrary code execution in the kernel context and privilege escalation, aka CID-c3e2219216c9. This is related to blk_mq_free_rqs and blk_cleanup_queue.