Trustwave and Cybereason Merge to Form Global MDR Powerhouse for Unparalleled Cybersecurity Value. Learn More
Get access to immediate incident response assistance.
Get access to immediate incident response assistance.
Trustwave and Cybereason Merge to Form Global MDR Powerhouse for Unparalleled Cybersecurity Value. Learn More
For September 2019, Microsoft is releasing 78 CVEs. Of these CVEs, 17 are rated "Critical", 60 rated "Important", and one rated "Moderate". Additionally, this release includes the regular rollup patch for critical vulnerabilities in Adobe Flash, but you're no longer using Flash right?
The vulnerabilities rated as "Critical" include the standard ones affecting the scripting engine most often used during web browsing. Four new "Critical" CVEs have been issued for the Remote Desktop Client. After the Bluekeep (CVE-2019-0708) vulnerability was patched back in May, there has been a lot of focus on RDP and security. Luckily there are no known "in the wild" exploits for these new Remote Code Execution (RCE) vulnerabilities and even Bluekeep just received a beta module for Metasploit last week, three months after the patch release. This tells us what we should already know. If you can keep your patches up to date, you will greatly reduce your risk exposure. Also of interest on the "Critical" list are three CVEs covering RCE vulnerabilities in Microsoft SharePoint, a new RCE for Microsoft shortcuts (LNK files) and an RCE for Azure DevOps and Team Foundation Server.
On the list of "Important" CVEs the story is primarily about Privilege Escalation. Two CVEs were publicly disclosed before today's patches were released. One is for the Windows Text Service Framework (CVE-2019-1235) which was disclosed on Aug 23rd. The other is for Windows Secure Boot (CVE-2019-1294) where setting certain debug options for Secure Boot prior to a reboot could allow an attacker to bypass the secure reboot function in the future.
More importantly are two Privilege Escalation that have been seen exploited in the wild. One affects the Windows Common Log File System (CLFS) Driver (CVE-2019-1214) and the other affects the Winsock driver ws2ifsl.sys (CVE-2019-1215). Both are memory corruption issues that could allow an attacker that is already logged into a vulnerable system to elevate their user privilege to system level access.
Those two "in the wild" exploits alone should be enough to get everyone patching today, so I'll leave you admins to it and see you next month. Until then, stay safe.
Critical
Azure DevOps and Team Foundation Server Remote Code Execution Vulnerability
CVE-2019-1306
Remote Code Execution
Chakra Scripting Engine Memory Corruption Vulnerability
CVE-2019-1138, CVE-2019-1217, CVE-2019-1237, CVE-2019-1298, CVE-2019-1300
Remote Code Execution
LNK Remote Code Execution Vulnerability
CVE-2019-1280
Remote Code Execution
Microsoft SharePoint Remote Code Execution Vulnerability
CVE-2019-1257, CVE-2019-1295, CVE-2019-1296
Remote Code Execution
Remote Desktop Client Remote Code Execution Vulnerability
CVE-2019-0787, CVE-2019-0788, CVE-2019-1290, CVE-2019-1291
Remote Code Execution
Scripting Engine Memory Corruption Vulnerability
CVE-2019-1221
Remote Code Execution
VBScript Remote Code Execution Vulnerability
CVE-2019-1208, CVE-2019-1236
Remote Code Execution
September 2019 Adobe Flash Security Update
ADV190022
Remote Code Execution
Important
.NET Core Denial of Service Vulnerability
CVE-2019-1301
Denial of Service
.NET Framework Elevation of Privilege Vulnerability
CVE-2019-1142
Elevation of Privilege
Active Directory Federation Services XSS Vulnerability
CVE-2019-1273
Spoofing
ASP.NET Core Elevation Of Privilege Vulnerability
CVE-2019-1302
Elevation of Privilege
Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability
CVE-2019-1232
Elevation of Privilege
DirectWrite Information Disclosure Vulnerability
CVE-2019-1244, CVE-2019-1245, CVE-2019-1251
Information Disclosure
DirectX Elevation of Privilege Vulnerability
CVE-2019-1284, CVE-2019-1216
Information Disclosure
Jet Database Engine Remote Code Execution Vulnerability
CVE-2019-1240, CVE-2019-1241, CVE-2019-1242, CVE-2019-1243, CVE-2019-1246, CVE-2019-1247, CVE-2019-1248, CVE-2019-1249, CVE-2019-1250
Remote Code Execution
Lync 2013 Information Disclosure Vulnerability
CVE-2019-1209
Information Disclosure
Microsoft Browser Security Feature Bypass Vulnerability
CVE-2019-1220
Security Feature Bypass
Microsoft Compatibility Appraiser Elevation of Privilege Vulnerability
CVE-2019-1267
Elevation of Privilege
Microsoft Edge based on Edge HTML Information Disclosure Vulnerability
CVE-2019-1299
Information Disclosure
Microsoft Excel Information Disclosure Vulnerability
CVE-2019-1263
Information Disclosure
Microsoft Excel Remote Code Execution Vulnerability
CVE-2019-1297
Remote Code Execution
Microsoft Exchange Denial of Service Vulnerability
CVE-2019-1233
Denial of Service
Microsoft Exchange Spoofing Vulnerability
CVE-2019-1266
Spoofing
Microsoft Graphics Components Information Disclosure Vulnerability
CVE-2019-1283
Information Disclosure
Microsoft Office Security Feature Bypass Vulnerability
CVE-2019-1264
Security Feature Bypass
Microsoft Office SharePoint XSS Vulnerability
CVE-2019-1262
Spoofing
Microsoft SharePoint Elevation of Privilege Vulnerability
CVE-2019-1260
Elevation of Privilege
Microsoft SharePoint Spoofing Vulnerability
CVE-2019-1261
Spoofing
Microsoft Windows Store Installer Elevation of Privilege Vulnerability
CVE-2019-1270
Elevation of Privilege
Microsoft Yammer Security Feature Bypass Vulnerability
CVE-2019-1265
Security Feature Bypass
Rome SDK Information Disclosure Vulnerability
CVE-2019-1231
Information Disclosure
Team Foundation Server Cross-site Scripting Vulnerability
CVE-2019-1305
Spoofing
Win32k Elevation of Privilege Vulnerability
CVE-2019-1256, CVE-2019-1285
Elevation of Privilege
Windows ALPC Elevation of Privilege Vulnerability
CVE-2019-1269, CVE-2019-1272
Elevation of Privilege
Windows Audio Service Elevation of Privilege Vulnerability
CVE-2019-1277
Elevation of Privilege
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2019-1214
Elevation of Privilege
Windows Common Log File System Driver Information Disclosure Vulnerability
CVE-2019-1282
Information Disclosure
Windows Denial of Service Vulnerability
CVE-2019-1292
Denial of Service
Windows Elevation of Privilege Vulnerability
CVE-2019-1215, CVE-2019-1253, CVE-2019-1303
Elevation of Privilege
Windows GDI Information Disclosure Vulnerability
CVE-2019-1252, CVE-2019-1286
Information Disclosure
Windows Hyper-V Denial of Service Vulnerability
CVE-2019-0928
Denial of Service
Windows Hyper-V Information Disclosure Vulnerability
CVE-2019-1254
Information Disclosure
Windows Kernel Information Disclosure Vulnerability
CVE-2019-1274
Information Disclosure
Windows Media Elevation of Privilege Vulnerability
CVE-2019-1271
Elevation of Privilege
Windows Network Connectivity Assistant Elevation of Privilege Vulnerability
CVE-2019-1287
Elevation of Privilege
Windows Secure Boot Security Feature Bypass Vulnerability
CVE-2019-1294
Security Feature Bypass
Windows SMB Client Driver Information Disclosure Vulnerability
CVE-2019-1293
Information Disclosure
Windows Text Service Framework Elevation of Privilege Vulnerability
CVE-2019-1235
Elevation of Privilege
Windows Transaction Manager Information Disclosure Vulnerability
CVE-2019-1219
Information Disclosure
Windows Update Delivery Optimization Elevation of Privilege Vulnerability
CVE-2019-1289
Elevation of Privilege
Winlogon Elevation of Privilege Vulnerability
CVE-2019-1268
Elevation of Privilege
Moderate
Microsoft SharePoint Spoofing Vulnerability
CVE-2019-1259
Spoofing
Karl Sigler is Security Research Manager, SpiderLabs Threat Intelligence at Trustwave. Karl is a 20-year infosec veteran responsible for research and analysis of current vulnerabilities, malware and threat trends at Trustwave. Follow Karl on LinkedIn.
Trustwave is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.
Copyright © 2024 Trustwave Holdings, Inc. All rights reserved.