Published on: 09 May 2018
Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. The list of security updates can be found at:
https://support.microsoft.com/en-us/help/20180508/security-update-deployment-information
Reports indicate that exploitation of two zero-day vulnerabilities were detected against Windows systems, including CVE-2018-8120 and CVE-2018-8174. Users are advised to take immediate action to patch the affected systems since there is elevated risk of cyber attacks for the vulnerabilities.
A complete list of the affected products can be found at:
https://portal.msrc.microsoft.com/en-us/security-guidance
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, denial of service, elevation of privilege, information disclosure security feature bypass or spoofing
Patches for affected products are available from the Windows Update/Microsoft Update Catalog. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/a82328f9-1f26-e811-a968-000d3a33a34d
https://support.microsoft.com/en-us/help/20180508/security-update-deployment-information
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180008
https://www.hkcert.org/my_url/en/alert/18050901
https://www.us-cert.gov/ncas/current-activity/2018/05/08/Microsoft-Releases-May-2018-Security-Updates
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0765
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0824
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0854
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0943
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0945
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0946
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0951
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0953 (to CVE-2018-0955)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0958
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0959
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0961
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1021
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1022
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1025
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1039
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8112
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8114
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8115
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8119
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8120
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8122 (to CVE-2018-8124)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8126 (to CVE-2018-8130)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8132 (to CVE-2018-8134)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8136
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8137
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8139
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8141
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8142
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8145
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8147 (to CVE-2018-8168)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8170
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8173
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8174
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8177 (to CVE-2018-8179)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897