Trustwave and Cybereason Merge to Form Global MDR Powerhouse for Unparalleled Cybersecurity Value. Learn More

Trustwave and Cybereason Merge to Form Global MDR Powerhouse for Unparalleled Cybersecurity Value. Learn More

Services
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

Database Security

Prevent unauthorized access and exceed compliance requirements.

Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Microsoft Security
Unlock the full power of Microsoft Security
Offensive Security
Solutions to maximize your security ROI
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats

June's Patch Tuesday has crept upon us and while our minds may be elsewhere, the need to keep our systems up to date never goes away. Microsoft is releasing patches for 129 CVEs today. A dozen of those are rated as "Critical", 115 rated "Important", one rated "Moderate", and one oddly rated as "Not a Vulnerability".

Among the CVEs rated "Critical" you will find Remote Code Execution vulnerabilities affecting LNK shortcuts, Windows Graphics Device Interface (GDI), Microsoft SharePoint, the Windows command shell and OS in general, and the regular RCE vulnerabilities in the Scripting engine. The massive list of "Important" vulnerabilities includes software and OS level vulnerabilities across the board. This includes the Windows OS for both Servers and Clients as well as popular packages like the Office Suite. The wide majority of these vulnerabilities are Elevation of Privilege vulnerabilities, which are often used by attackers to initially target standard users and then escalate their access to Administrator or System.

Luckily no exploits have been publicly released for these vulnerabilities (or any of the vulnerabilities patched today) so admins will have time to apply these patches. So get to patching and please stay safe out there.

 

Critical

GDI+ Remote Code Execution Vulnerability
CVE-2020-1248
Remote Code Execution

LNK Remote Code Execution Vulnerability
CVE-2020-1299
Remote Code Execution

Microsoft Browser Memory Corruption Vulnerability
CVE-2020-1219
Remote Code Execution

Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2020-1181
Remote Code Execution

Scripting Engine Memory Corruption Vulnerability
CVE-2020-1073
Remote Code Execution

VBScript Remote Code Execution Vulnerability
CVE-2020-1213, CVE-2020-1216, CVE-2020-1260
Remote Code Execution

Windows OLE Remote Code Execution Vulnerability
CVE-2020-1281
Remote Code Execution

Windows Remote Code Execution Vulnerability
CVE-2020-1300
Remote Code Execution

Windows Shell Remote Code Execution Vulnerability
CVE-2020-1286
Remote Code Execution

June 2020 Adobe Flash Security Update
ADV200010
Remote Code Execution

 

Important

Azure DevOps Server HTML Injection Vulnerability
CVE-2020-1327
Spoofing

Component Object Model Elevation of Privilege Vulnerability
CVE-2020-1311
Elevation of Privilege

Connected Devices Platform Service Elevation of Privilege Vulnerability
CVE-2020-1211
Elevation of Privilege

Connected User Experiences and Telemetry Service Denial of Service Vulnerability
CVE-2020-1120, CVE-2020-1244
Elevation of Privilege

Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability
CVE-2020-1202, CVE-2020-1203, CVE-2020-1257, CVE-2020-1278, CVE-2020-1293
Elevation of Privilege

DirectX Elevation of Privilege Vulnerability
CVE-2020-1258
Elevation of Privilege

Group Policy Elevation of Privilege Vulnerability
CVE-2020-1317
Elevation of Privilege

Internet Explorer Information Disclosure Vulnerability
CVE-2020-1315
Information Disclosure

Jet Database Engine Remote Code Execution Vulnerability
CVE-2020-1208, CVE-2020-1236
Remote Code Execution

Media Foundation Information Disclosure Vulnerability
CVE-2020-1232
Information Disclosure

Media Foundation Memory Corruption Vulnerability
CVE-2020-1238, CVE-2020-1239
Remote Code Execution

Microsoft Bing Search Spoofing Vulnerability
CVE-2020-1329
Spoofing

Microsoft Edge (Chromium-based) in IE Mode Spoofing Vulnerability
CVE-2020-1220
Spoofing

Microsoft Edge Information Disclosure Vulnerability
CVE-2020-1242
Information Disclosure

Microsoft Excel Remote Code Execution Vulnerability
CVE-2020-1225, CVE-2020-1226
Remote Code Execution

Microsoft Graphics Component Information Disclosure Vulnerability
CVE-2020-1160
Information Disclosure

Microsoft Office Remote Code Execution Vulnerability
CVE-2020-1321
Remote Code Execution

Microsoft Office SharePoint XSS Vulnerability
CVE-2020-1177, CVE-2020-1183, CVE-2020-1297, CVE-2020-1298, CVE-2020-1318, CVE-2020-1320
Spoofing

Microsoft Outlook Security Feature Bypass Vulnerability
CVE-2020-1229
Security Feature Bypass

Microsoft Project Information Disclosure Vulnerability
CVE-2020-1322
Information Disclosure

Microsoft SharePoint Elevation of Privilege Vulnerability
CVE-2020-1295
Elevation of Privilege

Microsoft SharePoint Server Elevation of Privilege Vulnerability
CVE-2020-1178
Elevation of Privilege

Microsoft SharePoint Spoofing Vulnerability
CVE-2020-1148, CVE-2020-1289
Spoofing

Microsoft Store Runtime Elevation of Privilege Vulnerability
CVE-2020-1222, CVE-2020-1309
Elevation of Privilege

Microsoft Windows Defender Elevation of Privilege Vulnerability
CVE-2020-1163, CVE-2020-1170
Elevation of Privilege

NuGetGallery Spoofing Vulnerability
CVE-2020-1340
Spoofing

OLE Automation Elevation of Privilege Vulnerability
CVE-2020-1212
Elevation of Privilege

OpenSSH for Windows Elevation of Privilege Vulnerability
CVE-2020-1292
Elevation of Privilege

SharePoint Open Redirect Vulnerability
CVE-2020-1323
Spoofing

System Center Operations Manager Spoofing Vulnerability
CVE-2020-1331
Spoofing

VBScript Remote Code Execution Vulnerability
CVE-2020-1214, CVE-2020-1215, CVE-2020-1230
Remote Code Execution

Win32k Elevation of Privilege Vulnerability
CVE-2020-1207, CVE-2020-1247, CVE-2020-1251, CVE-2020-1253, CVE-2020-1310
Elevation of Privilege

Win32k Information Disclosure Vulnerability
CVE-2020-1290
Information Disclosure

Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability
CVE-2020-1255
Elevation of Privilege

Windows Backup Service Elevation of Privilege Vulnerability
CVE-2020-1271
Elevation of Privilege

Windows Bluetooth Service Elevation of Privilege Vulnerability
CVE-2020-1280
Elevation of Privilege

Windows Denial of Service Vulnerability
CVE-2020-1283
Denial of Service

Windows Diagnostics & feedback Information Disclosure Vulnerability
CVE-2020-1296
Information Disclosure

Windows Elevation of Privilege Vulnerability
CVE-2020-1162, CVE-2020-1324
Elevation of Privilege

Windows Error Reporting Elevation of Privilege Vulnerability
CVE-2020-1234
Elevation of Privilege

Windows Error Reporting Information Disclosure Vulnerability
CVE-2020-1261, CVE-2020-1263
Information Disclosure

Windows Error Reporting Manager Elevation of Privilege Vulnerability
CVE-2020-1197
Elevation of Privilege

Windows Feedback Hub Elevation of Privilege Vulnerability
CVE-2020-1199
Elevation of Privilege

Windows GDI Elevation of Privilege Vulnerability
CVE-2020-0915, CVE-2020-0916
Elevation of Privilege

Windows GDI Information Disclosure Vulnerability
CVE-2020-1348
Information Disclosure

Windows Host Guardian Service Security Feature Bypass Vulnerability
CVE-2020-1259
Security Feature Bypass

Windows Installer Elevation of Privilege Vulnerability
CVE-2020-1272, CVE-2020-1277, CVE-2020-1302, CVE-2020-1312
Elevation of Privilege

Windows Kernel Elevation of Privilege Vulnerability
CVE-2020-0986, CVE-2020-1237, CVE-2020-1246, CVE-2020-1262, CVE-2020-1264, CVE-2020-1266, CVE-2020-1269, CVE-2020-1273, CVE-2020-1274, CVE-2020-1275, CVE-2020-1276, CVE-2020-1307, CVE-2020-1316
Elevation of Privilege

Windows Kernel Security Feature Bypass Vulnerability
CVE-2020-1241
Security Feature Bypass

Windows Lockscreen Elevation of Privilege Vulnerability
CVE-2020-1279
Elevation of Privilege

Windows Mobile Device Management Diagnostics Elevation of Privilege Vulnerability
CVE-2020-1204
Elevation of Privilege

Windows Modules Installer Service Elevation of Privilege Vulnerability
CVE-2020-1254
Elevation of Privilege

Windows Network Connections Service Elevation of Privilege Vulnerability
CVE-2020-1291
Elevation of Privilege

Windows Network List Service Elevation of Privilege Vulnerability
CVE-2020-1209
Information Disclosure

Windows Now Playing Session Manager Elevation of Privilege Vulnerability
CVE-2020-1201
Elevation of Privilege

Windows Print Configuration Elevation of Privilege Vulnerability
CVE-2020-1196
Elevation of Privilege

Windows Runtime Elevation of Privilege Vulnerability
CVE-2020-1231, CVE-2020-1233, CVE-2020-1235, CVE-2020-1265, CVE-2020-1282, CVE-2020-1304, CVE-2020-1306, CVE-2020-1334
Elevation of Privilege

Windows Runtime Information Disclosure Vulnerability
CVE-2020-1217
Information Disclosure

Windows Service Information Disclosure Vulnerability
CVE-2020-1268
Information Disclosure

Windows SMB Remote Code Execution Vulnerability
CVE-2020-1301
Remote Code Execution

Windows SMBv3 Client/Server Denial of Service Vulnerability
CVE-2020-1284
Denial of Service

Windows SMBv3 Client/Server Information Disclosure Vulnerability
CVE-2020-1206
Information Disclosure

Windows State Repository Service Elevation of Privilege Vulnerability
CVE-2020-1305
Elevation of Privilege

Windows Text Service Framework Elevation of Privilege Vulnerability
CVE-2020-1314
Elevation of Privilege

Windows Update Orchestrator Service Elevation of Privilege Vulnerability
CVE-2020-1313
Elevation of Privilege

Windows WalletService Elevation of Privilege Vulnerability
CVE-2020-1287, CVE-2020-1294
Elevation of Privilege

Windows WLAN Service Elevation of Privilege Vulnerability
CVE-2020-1270
Elevation of Privilege

Word for Android Remote Code Execution Vulnerability
CVE-2020-1223
Remote Code Execution

Windows Registry Denial of Service Vulnerability
CVE-2020-1194
Denial of Service

 

Moderate

Visual Studio Code Live Share Information Disclosure Vulnerability
CVE-2020-1343
Elevation of Privilege

About the Author

Karl Sigler is Security Research Manager, SpiderLabs Threat Intelligence at Trustwave. Karl is a 20-year infosec veteran responsible for research and analysis of current vulnerabilities, malware and threat trends at Trustwave. Follow Karl on LinkedIn.

ABOUT TRUSTWAVE

Trustwave is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.

Latest Intelligence

Discover how our specialists can tailor a security program to fit the needs of
your organization.

Request a Demo