Patch Tuesday March 2020
Today marks Microsoft's March Patch Tuesday. While it may not be on the top of everyone's March priority list, 116 CVEs suggest that you don't ignore this Patch Tuesday.
Of the 116 CVEs patched today, 26 are rated as "Critical" and represent the usual suspects we see month to month. Specifically, you'll find the various Remote Code Execution (RCE) vulnerabilities in the Windows Scripting Engine, which is used primarily in the Edge and Internet Explorer web browsers. Rounding out the Critical list are RCE vulnerabilities in Dynamics Business Central and in LNK files, where a malicious shortcut LNK file could trigger arbitrary code execution.
The list of CVEs rated as "Important" is a long one with 90 CVEs patched. The majority of the vulnerabilities are Elevation of Privilege, which attackers rely on to expand their access from a general low-level user to full system or even network access. This includes privilege escalation in Azure DevOps, Windows OS including the Kernel, and Microsoft Defender, a component that's supposed to bring more security, not introduce risk. There are also multiple RCE vulnerabilities in Microsoft Word, so don't accept any odd documents from strangers.
Luckily none of the CVEs patched today have any public exploits available, but as we all know, that's just a matter of time. So get to patching, and don't forget to wash your hands before and after!
Critical
Chakra Scripting Engine Memory Corruption Vulnerability
CVE-2020-0811, CVE-2020-0812
Remote Code Execution
Dynamics Business Central Remote Code Execution Vulnerability
CVE-2020-0905
Remote Code Execution
GDI+ Remote Code Execution Vulnerability
CVE-2020-0881, CVE-2020-0883
Remote Code Execution
LNK Remote Code Execution Vulnerability
CVE-2020-0684
Remote Code Execution
Media Foundation Memory Corruption Vulnerability
CVE-2020-0801, CVE-2020-0807, CVE-2020-0809, CVE-2020-0869
Remote Code Execution
Microsoft Browser Memory Corruption Vulnerability
CVE-2020-0768, CVE-2020-0830
Remote Code Execution
Microsoft Edge Memory Corruption Vulnerability
CVE-2020-0816
Remote Code Execution
Scripting Engine Memory Corruption Vulnerability
CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848
Remote Code Execution
VBScript Remote Code Execution Vulnerability
CVE-2020-0824, CVE-2020-0847
Remote Code Execution
Important
Azure DevOps Elevation of Privilege Vulnerability
CVE-2020-0758, CVE-2020-0815
Elevation of Privilege
Azure DevOps Server Cross-site Scripting Vulnerability
CVE-2020-0700
Spoofing
Connected User Experiences and Telemetry Service Elevation of Privilege Vulnerability
CVE-2020-0844
Elevation of Privilege
Connected User Experiences and Telemetry Service Information Disclosure Vulnerability
CVE-2020-0863
Information Disclosure
Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability
CVE-2020-0810, CVE-2020-0793
Elevation of Privilege
DirectX Elevation of Privilege Vulnerability
CVE-2020-0690
Elevation of Privilege
Media Foundation Information Disclosure Vulnerability
CVE-2020-0820
Information Disclosure
Microsoft Defender Elevation of Privilege Vulnerability
CVE-2020-0762, CVE-2020-0763
Elevation of Privilege
Microsoft Exchange Server Spoofing Vulnerability
CVE-2020-0903
Spoofing
Microsoft IIS Server Tampering Vulnerability
CVE-2020-0645
Tampering
Microsoft Office SharePoint XSS Vulnerability
CVE-2020-0893, CVE-2020-0894
Spoofing
Microsoft SharePoint Reflective XSS Vulnerability
CVE-2020-0795, CVE-2020-0891
Spoofing
Microsoft Visual Studio Spoofing Vulnerability
CVE-2020-0884
Spoofing
Microsoft Word Remote Code Execution Vulnerability
CVE-2020-0850, CVE-2020-0851, CVE-2020-0852, CVE-2020-0855, CVE-2020-0892
Remote Code Execution
Provisioning Runtime Elevation of Privilege Vulnerability
CVE-2020-0808
Elevation of Privilege
Remote Code Execution Vulnerability in Application Inspector
CVE-2020-0872
Remote Code Execution
Scripting Engine Information Disclosure Vulnerability
CVE-2020-0813
Information Disclosure
Service Fabric Elevation of Privilege
CVE-2020-0902
Elevation of Privilege
Visual Studio Extension Installer Service Denial of Service Vulnerability
CVE-2020-0789
Denial of Service
Win32k Elevation of Privilege Vulnerability
CVE-2020-0788, CVE-2020-0877, CVE-2020-0887
Elevation of Privilege
Win32k Information Disclosure Vulnerability
CVE-2020-0876
Information Disclosure
Windows ActiveX Installer Service Elevation of Privilege Vulnerability
CVE-2020-0770, CVE-2020-0773, CVE-2020-0860
Elevation of Privilege
Windows ALPC Elevation of Privilege Vulnerability
CVE-2020-0834
Elevation of Privilege
Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability
CVE-2020-0787
Elevation of Privilege
Windows CSC Service Elevation of Privilege Vulnerability
CVE-2020-0769, CVE-2020-0771
Elevation of Privilege
Windows Device Setup Manager Elevation of Privilege Vulnerability
CVE-2020-0819
Elevation of Privilege
Windows Elevation of Privilege Vulnerability
CVE-2020-0776, CVE-2020-0858
Elevation of Privilege
Windows Error Reporting Elevation of Privilege Vulnerability
CVE-2020-0772, CVE-2020-0806
Elevation of Privilege
Windows Error Reporting Information Disclosure Vulnerability
CVE-2020-0775
Information Disclosure
Windows GDI Information Disclosure Vulnerability
CVE-2020-0774, CVE-2020-0874, CVE-2020-0879, CVE-2020-0880, CVE-2020-0882
Information Disclosure
Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2020-0791, CVE-2020-0898
Elevation of Privilege
Windows Graphics Component Information Disclosure Vulnerability
CVE-2020-0885
Information Disclosure
Windows Hard Link Elevation of Privilege Vulnerability
CVE-2020-0840, CVE-2020-0841, CVE-2020-0896, CVE-2020-0849
Elevation of Privilege
Windows Imaging Component Information Disclosure Vulnerability
CVE-2020-0853
Information Disclosure
Windows Installer Elevation of Privilege Vulnerability
CVE-2020-0779, CVE-2020-0798, CVE-2020-0814, CVE-2020-0842, CVE-2020-0843
Elevation of Privilege
Windows Kernel Elevation of Privilege Vulnerability
CVE-2020-0799
Elevation of Privilege
Windows Language Pack Installer Elevation of Privilege Vulnerability
CVE-2020-0822
Elevation of Privilege
Windows Mobile Device Management Diagnostics Elevation of Privilege Vulnerability
CVE-2020-0854
Elevation of Privilege
Windows Modules Installer Service Information Disclosure Vulnerability
CVE-2020-0859
Information Disclosure
Windows Network Connections Service Elevation of Privilege Vulnerability
CVE-2020-0778, CVE-2020-0802, CVE-2020-0803, CVE-2020-0804, CVE-2020-0845
Elevation of Privilege
Windows Network Connections Service Information Disclosure Vulnerability
CVE-2020-0871
Information Disclosure
Windows Network Driver Interface Specification (NDIS) Information Disclosure Vulnerability
CVE-2020-0861
Information Disclosure
Windows Network List Service Elevation of Privilege Vulnerability
CVE-2020-0780
Elevation of Privilege
Windows Search Indexer Elevation of Privilege Vulnerability
CVE-2020-0857
Elevation of Privilege
Windows Tile Object Service Denial of Service Vulnerability
CVE-2020-0786
Denial of Service
Windows Update Orchestrator Service Elevation of Privilege Vulnerability
CVE-2020-0867, CVE-2020-0868
Elevation of Privilege
Windows UPnP Service Elevation of Privilege Vulnerability
CVE-2020-0781, CVE-2020-0783
Elevation of Privilege
Windows User Profile Service Elevation of Privilege Vulnerability
CVE-2020-0785
Elevation of Privilege
Windows Work Folder Service Elevation of Privilege Vulnerability
CVE-2020-0777, CVE-2020-0797, CVE-2020-0800, CVE-2020-0864, CVE-2020-0865, CVE-2020-0866, CVE-2020-0897
Elevation of Privilege
Defense in Depth
Remote Desktop Connection Manager Information Disclosure Vulnerability
CVE-2020-0765
Information Disclosure
About the Author
Karl Sigler is Security Research Manager, SpiderLabs Threat Intelligence at Trustwave. Karl is a 20-year infosec veteran responsible for research and analysis of current vulnerabilities, malware and threat trends at Trustwave. Follow Karl on LinkedIn.
ABOUT TRUSTWAVE
Trustwave is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.