Published on: 15 August 2018
Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. The list of security updates can be found at:
https://support.microsoft.com/en-us/help/20180814/security-update-deployment-information-august-14-2018
Reports indicate that exploitation of two zero-day vulnerabilities were detected against Internet Explorer and Windows systems, including CVE-2018-8373 and CVE-2018-8414. Users are advised to take immediate action to patch the affected systems since there is elevated risk of cyber attacks for the vulnerabilities.
A complete list of the affected products can be found at:
https://portal.msrc.microsoft.com/en-us/security-guidance
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, elevation of privilege, information disclosure, security feature bypass, tampering or spoofing.
Patches for affected products are available from the Windows Update/Microsoft Update Catalog. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/ecb26425-583f-e811-a96f-000d3a33c573
https://support.microsoft.com/en-us/help/20180814/security-update-deployment-information-august-14-2018
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180020
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180021
https://www.hkcert.org/my_url/en/alert/18081501
https://www.us-cert.gov/ncas/current-activity/2018/08/14/Microsoft-Releases-August-2018-Security-Updates
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0952
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8200
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8204
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8253
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8266
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8273
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8302
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8316
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8339
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8340 (to CVE-2018-8351)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8353
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8355
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8357 (to CVE-2018-8360)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8370 (to CVE-2018-8385)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8387 (to CVE-2018-8390)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8394
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8396 (to CVE-2018-8401)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8403 (to CVE-2018-8406)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8412
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8414