Published on: 10 October 2018
Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. The list of security updates can be found at:
https://support.microsoft.com/en-us/help/20181009/security-update-deployment-information-October-09-2018
Reports indicate that proof-of-concept and fully workable exploit codes targeting the vulnerabilities in Microsoft Jet Database Engine (CVE-2018-8423) and Windows Kernel (CVE-2018-8497) have been publicly disclosed. Active exploitation against another vulnerability in the Windows operation system (CVE-2018-8453) has also been observed. Users are advised to take immediate action to patch the affected systems since there is elevated risk of cyber attacks for the vulnerabilities.
A complete list of the affected products can be found at:
https://portal.msrc.microsoft.com/en-us/security-guidance
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, elevation of privilege, information disclosure or security feature bypass.
Patches for affected products are available from the Windows Update/Microsoft Update Catalog. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/aa99ba28-e99f-e811-a978-000d3a33c573
https://support.microsoft.com/en-us/help/20181009/security-update-deployment-information-October-09-2018
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180026
https://www.hkcert.org/my_url/en/alert/18101001
https://www.us-cert.gov/ncas/current-activity/2018/10/09/Microsoft-Releases-October-2018-Security-Updates
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3190
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8265
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8320
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8329
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8330
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8333
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8411
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8413
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8427
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8432
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8453
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8460
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8473
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8480 (to CVE-2018-8482)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8484
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8486
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8490 (to CVE-2018-8495)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8497
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8498
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8500 (to CVE-2018-8506)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8509 (to CVE-2018-8513)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8518
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8527
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8530 (to CVE-2018-8533)