Trustwave and Cybereason Merge to Form Global MDR Powerhouse for Unparalleled Cybersecurity Value. Learn More

Trustwave and Cybereason Merge to Form Global MDR Powerhouse for Unparalleled Cybersecurity Value. Learn More

Services
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

Database Security

Prevent unauthorized access and exceed compliance requirements.

Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Microsoft Security
Unlock the full power of Microsoft Security
Offensive Security
Solutions to maximize your security ROI
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats

Today marks Microsoft's March Patch Tuesday. While it may not be on the top of everyone's March priority list, 116 CVEs suggest that you don't ignore this Patch Tuesday.

Of the 116 CVEs patched today, 26 are rated as "Critical" and represent the usual suspects we see month to month. Specifically, you'll find the various Remote Code Execution (RCE) vulnerabilities in the Windows Scripting Engine, which is used primarily in the Edge and Internet Explorer web browsers. Rounding out the Critical list are RCE vulnerabilities in Dynamics Business Central and in LNK files, where a malicious shortcut LNK file could trigger arbitrary code execution.

The list of CVEs rated as "Important" is a long one with 90 CVEs patched. The majority of the vulnerabilities are Elevation of Privilege, which attackers rely on to expand their access from a general low-level user to full system or even network access. This includes privilege escalation in Azure DevOps, Windows OS including the Kernel, and Microsoft Defender, a component that's supposed to bring more security, not introduce risk. There are also multiple RCE vulnerabilities in Microsoft Word, so don't accept any odd documents from strangers.

Luckily none of the CVEs patched today have any public exploits available, but as we all know, that's just a matter of time. So get to patching, and don't forget to wash your hands before and after!

 

Critical

Chakra Scripting Engine Memory Corruption Vulnerability
CVE-2020-0811, CVE-2020-0812
Remote Code Execution

Dynamics Business Central Remote Code Execution Vulnerability
CVE-2020-0905
Remote Code Execution

GDI+ Remote Code Execution Vulnerability
CVE-2020-0881, CVE-2020-0883
Remote Code Execution

LNK Remote Code Execution Vulnerability
CVE-2020-0684
Remote Code Execution

Media Foundation Memory Corruption Vulnerability
CVE-2020-0801, CVE-2020-0807, CVE-2020-0809, CVE-2020-0869
Remote Code Execution

Microsoft Browser Memory Corruption Vulnerability
CVE-2020-0768, CVE-2020-0830
Remote Code Execution

Microsoft Edge Memory Corruption Vulnerability
CVE-2020-0816
Remote Code Execution

Scripting Engine Memory Corruption Vulnerability
CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848
Remote Code Execution

VBScript Remote Code Execution Vulnerability
CVE-2020-0824, CVE-2020-0847
Remote Code Execution

 

Important

Azure DevOps Elevation of Privilege Vulnerability
CVE-2020-0758, CVE-2020-0815
Elevation of Privilege

Azure DevOps Server Cross-site Scripting Vulnerability
CVE-2020-0700
Spoofing

Connected User Experiences and Telemetry Service Elevation of Privilege Vulnerability
CVE-2020-0844
Elevation of Privilege

Connected User Experiences and Telemetry Service Information Disclosure Vulnerability
CVE-2020-0863
Information Disclosure

Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability
CVE-2020-0810, CVE-2020-0793
Elevation of Privilege

DirectX Elevation of Privilege Vulnerability
CVE-2020-0690
Elevation of Privilege

Media Foundation Information Disclosure Vulnerability
CVE-2020-0820
Information Disclosure

Microsoft Defender Elevation of Privilege Vulnerability
CVE-2020-0762, CVE-2020-0763
Elevation of Privilege

Microsoft Exchange Server Spoofing Vulnerability
CVE-2020-0903
Spoofing

Microsoft IIS Server Tampering Vulnerability
CVE-2020-0645
Tampering

Microsoft Office SharePoint XSS Vulnerability
CVE-2020-0893, CVE-2020-0894
Spoofing

Microsoft SharePoint Reflective XSS Vulnerability
CVE-2020-0795, CVE-2020-0891
Spoofing

Microsoft Visual Studio Spoofing Vulnerability
CVE-2020-0884
Spoofing

Microsoft Word Remote Code Execution Vulnerability
CVE-2020-0850, CVE-2020-0851, CVE-2020-0852, CVE-2020-0855, CVE-2020-0892
Remote Code Execution

Provisioning Runtime Elevation of Privilege Vulnerability
CVE-2020-0808
Elevation of Privilege

Remote Code Execution Vulnerability in Application Inspector
CVE-2020-0872
Remote Code Execution

Scripting Engine Information Disclosure Vulnerability
CVE-2020-0813
Information Disclosure

Service Fabric Elevation of Privilege
CVE-2020-0902
Elevation of Privilege

Visual Studio Extension Installer Service Denial of Service Vulnerability
CVE-2020-0789
Denial of Service

Win32k Elevation of Privilege Vulnerability
CVE-2020-0788, CVE-2020-0877, CVE-2020-0887
Elevation of Privilege

Win32k Information Disclosure Vulnerability
CVE-2020-0876
Information Disclosure

Windows ActiveX Installer Service Elevation of Privilege Vulnerability
CVE-2020-0770, CVE-2020-0773, CVE-2020-0860
Elevation of Privilege

Windows ALPC Elevation of Privilege Vulnerability
CVE-2020-0834
Elevation of Privilege

Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability
CVE-2020-0787
Elevation of Privilege

Windows CSC Service Elevation of Privilege Vulnerability
CVE-2020-0769, CVE-2020-0771
Elevation of Privilege

Windows Device Setup Manager Elevation of Privilege Vulnerability
CVE-2020-0819
Elevation of Privilege

Windows Elevation of Privilege Vulnerability
CVE-2020-0776, CVE-2020-0858
Elevation of Privilege

Windows Error Reporting Elevation of Privilege Vulnerability
CVE-2020-0772, CVE-2020-0806
Elevation of Privilege

Windows Error Reporting Information Disclosure Vulnerability
CVE-2020-0775
Information Disclosure

Windows GDI Information Disclosure Vulnerability
CVE-2020-0774, CVE-2020-0874, CVE-2020-0879, CVE-2020-0880, CVE-2020-0882
Information Disclosure

Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2020-0791, CVE-2020-0898
Elevation of Privilege

Windows Graphics Component Information Disclosure Vulnerability
CVE-2020-0885
Information Disclosure

Windows Hard Link Elevation of Privilege Vulnerability
CVE-2020-0840, CVE-2020-0841, CVE-2020-0896, CVE-2020-0849
Elevation of Privilege

Windows Imaging Component Information Disclosure Vulnerability
CVE-2020-0853
Information Disclosure

Windows Installer Elevation of Privilege Vulnerability
CVE-2020-0779, CVE-2020-0798, CVE-2020-0814, CVE-2020-0842, CVE-2020-0843
Elevation of Privilege

Windows Kernel Elevation of Privilege Vulnerability
CVE-2020-0799
Elevation of Privilege

Windows Language Pack Installer Elevation of Privilege Vulnerability
CVE-2020-0822
Elevation of Privilege

Windows Mobile Device Management Diagnostics Elevation of Privilege Vulnerability
CVE-2020-0854
Elevation of Privilege

Windows Modules Installer Service Information Disclosure Vulnerability
CVE-2020-0859
Information Disclosure

Windows Network Connections Service Elevation of Privilege Vulnerability
CVE-2020-0778, CVE-2020-0802, CVE-2020-0803, CVE-2020-0804, CVE-2020-0845
Elevation of Privilege

Windows Network Connections Service Information Disclosure Vulnerability
CVE-2020-0871
Information Disclosure

Windows Network Driver Interface Specification (NDIS) Information Disclosure Vulnerability
CVE-2020-0861
Information Disclosure

Windows Network List Service Elevation of Privilege Vulnerability
CVE-2020-0780
Elevation of Privilege

Windows Search Indexer Elevation of Privilege Vulnerability
CVE-2020-0857
Elevation of Privilege

Windows Tile Object Service Denial of Service Vulnerability
CVE-2020-0786
Denial of Service

Windows Update Orchestrator Service Elevation of Privilege Vulnerability
CVE-2020-0867, CVE-2020-0868
Elevation of Privilege

Windows UPnP Service Elevation of Privilege Vulnerability
CVE-2020-0781, CVE-2020-0783
Elevation of Privilege

Windows User Profile Service Elevation of Privilege Vulnerability
CVE-2020-0785
Elevation of Privilege

Windows Work Folder Service Elevation of Privilege Vulnerability
CVE-2020-0777, CVE-2020-0797, CVE-2020-0800, CVE-2020-0864, CVE-2020-0865, CVE-2020-0866, CVE-2020-0897
Elevation of Privilege

 

Defense in Depth 

Remote Desktop Connection Manager Information Disclosure Vulnerability
CVE-2020-0765
Information Disclosure

About the Author

Karl Sigler is Security Research Manager, SpiderLabs Threat Intelligence at Trustwave. Karl is a 20-year infosec veteran responsible for research and analysis of current vulnerabilities, malware and threat trends at Trustwave. Follow Karl on LinkedIn.

ABOUT TRUSTWAVE

Trustwave is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.

Latest Intelligence

Discover how our specialists can tailor a security program to fit the needs of
your organization.

Request a Demo