Trustwave and Cybereason Merge to Form Global MDR Powerhouse for Unparalleled Cybersecurity Value. Learn More
Get access to immediate incident response assistance.
Get access to immediate incident response assistance.
Trustwave and Cybereason Merge to Form Global MDR Powerhouse for Unparalleled Cybersecurity Value. Learn More
December's Patch Tuesday is here and, typical for the end of the year, it's a light month with only 58 CVEs patched. This includes 10 CVEs rated as "Critical", 46 rated as "Important" and 2 rated "Moderate". The short "Critical" list includes most of the month-to-month tenants including the Chakra Scripting Engine, Hyper-V, Dynamics 365, Exchange, Sharepoint, and Visual Studio. All of the "Critical" vulnerabilities are Remote Code Execution issues.
The "Important" list includes many of the same affected packages like Sharepoint and Dynamics, but you'll also want to make sure you're patching Azure. The core Windows OS is also affected through multiple packages like DirectX, Kerberos, SMB, Network connectivity, and Error logging. One vulnerability that affects NTFS file systems could allow an attacker with SMBv2 access to a vulnerable host to trigger arbitrary remote code. The last two bugs rated "Moderate"
Luckily none of this month's CVEs have any known public exploits, but make sure you get your systems patched before you check out for the year. And from each of us here at Trustwave SpiderLabs, have a wonderful holiday season and a happy New Year!
Chakra Scripting Engine Memory Corruption Vulnerability
CVE-2020-17131
Remote Code Execution
Git for Visual Studio Remote Code Execution Vulnerability
CVE-2020-17156
Remote Code Execution
Hyper-V Remote Code Execution Vulnerability
CVE-2020-17095
Remote Code Execution
Microsoft Dynamics 365 for Finance and Operations (on-premises) Remote Code Execution Vulnerability
CVE-2020-17152, CVE-2020-17158
Remote Code Execution
Microsoft Exchange Remote Code Execution Vulnerability
CVE-2020-17117, CVE-2020-17132, CVE-2020-17142
Remote Code Execution
Microsoft SharePoint Remote Code Execution Vulnerability
CVE-2020-17118, CVE-2020-17121
Remote Code Execution
Azure DevOps Server and Team Foundation Services Spoofing Vulnerability
CVE-2020-17145
Spoofing
Azure DevOps Server Spoofing Vulnerability
CVE-2020-17135
Spoofing
Azure SDK for C Security Feature Bypass Vulnerability
CVE-2020-17002
Elevation of Privilege
Azure SDK for Java Security Feature Bypass Vulnerability
CVE-2020-16971
Elevation of Privilege
DirectX Graphics Kernel Elevation of Privilege Vulnerability
CVE-2020-17137
Elevation of Privilege
Dynamics CRM Webclient Cross-site Scripting Vulnerability
CVE-2020-17147
Spoofing
Kerberos Security Feature Bypass Vulnerability
CVE-2020-16996
Security Feature Bypass
Microsoft Dynamics Business Central/NAV Information Disclosure
CVE-2020-17133
Information Disclosure
Microsoft Excel Information Disclosure Vulnerability
CVE-2020-17126
Information Disclosure
Microsoft Excel Remote Code Execution Vulnerability
CVE-2020-17122, CVE-2020-17123, CVE-2020-17125, CVE-2020-17127, CVE-2020-17128, CVE-2020-17129
Remote Code Execution
Microsoft Excel Security Feature Bypass Vulnerability
CVE-2020-17130
Security Feature Bypass
Microsoft Exchange Information Disclosure Vulnerability
CVE-2020-17143
Information Disclosure
Microsoft Exchange Remote Code Execution Vulnerability
CVE-2020-17141, CVE-2020-17144
Remote Code Execution
Microsoft Outlook Information Disclosure Vulnerability
CVE-2020-17119
Information Disclosure
Microsoft PowerPoint Remote Code Execution Vulnerability
CVE-2020-17124
Remote Code Execution
Microsoft SharePoint Elevation of Privilege Vulnerability
CVE-2020-17089
Elevation of Privilege
Microsoft SharePoint Information Disclosure Vulnerability
CVE-2020-17120
Information Disclosure
Visual Studio Code Remote Code Execution Vulnerability
CVE-2020-17150
Remote Code Execution
Visual Studio Code Remote Development Extension Remote Code Execution Vulnerability
CVE-2020-17148
Remote Code Execution
Windows Backup Engine Elevation of Privilege Vulnerability
CVE-2020-16958, CVE-2020-16959, CVE-2020-16960, CVE-2020-16961, CVE-2020-16962, CVE-2020-16963, CVE-2020-16964
Elevation of Privilege
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2020-17103, CVE-2020-17136
Elevation of Privilege
Windows Digital Media Receiver Elevation of Privilege Vulnerability
CVE-2020-17097
Elevation of Privilege
Windows Error Reporting Information Disclosure Vulnerability
CVE-2020-17094, CVE-2020-17138
Information Disclosure
Windows GDI+ Information Disclosure Vulnerability
CVE-2020-17098
Information Disclosure
Windows Lock Screen Security Feature Bypass Vulnerability
CVE-2020-17099
Security Feature Bypass
Windows Network Connections Service Elevation of Privilege Vulnerability
CVE-2020-17092
Elevation of Privilege
Windows NTFS Remote Code Execution Vulnerability
CVE-2020-17096
Remote Code Execution
Windows Overlay Filter Security Feature Bypass Vulnerability
CVE-2020-17134, CVE-2020-17139
Security Feature Bypass
Windows SMB Information Disclosure Vulnerability
CVE-2020-17140
Information Disclosure
Visual Studio Code Java Extension Pack Remote Code Execution Vulnerability
CVE-2020-17159
Remote Code Execution
Azure Sphere Security Feature Bypass Vulnerability
CVE-2020-17160
Security Feature Bypass
Microsoft Edge for Android Spoofing Vulnerability
CVE-2020-17153
Spoofing
Microsoft SharePoint Spoofing Vulnerability
CVE-2020-17115
Spoofing
Karl Sigler is Security Research Manager, SpiderLabs Threat Intelligence at Trustwave. Karl is a 20-year infosec veteran responsible for research and analysis of current vulnerabilities, malware and threat trends at Trustwave. Follow Karl on LinkedIn.
Trustwave is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.
Copyright © 2024 Trustwave Holdings, Inc. All rights reserved.