Published on: 14 November 2018
Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. The list of security updates can be found at:
https://support.microsoft.com/en-us/help/20181113/security-update-deployment-information-November-13-2018
Reports indicate active exploitation against vulnerability in Windows 7, Server 2008 and Server 2008 R2 (CVE-2018-8589) has also been observed. Users are advised to take immediate action to patch the affected systems since there is elevated risk of cyber attacks for the vulnerabilities.
A complete list of the affected products can be found at:
https://portal.msrc.microsoft.com/en-us/security-guidance
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, elevation of privilege, information disclosure, tampering, security feature bypass, denial of service and spoofing.
Patches for affected products are available from the Windows Update/Microsoft Update Catalog. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/ff746aa5-06a0-e811-a978-000d3a33c573
https://support.microsoft.com/en-us/help/20181113/security-update-deployment-information-november-13-2018
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180025
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV990001
https://www.hkcert.org/my_url/en/alert/18111401
https://www.us-cert.gov/ncas/current-activity/2018/11/13/Microsoft-Releases-November-2018-Security-Updates
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8256
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8407
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8415 (to CVE-2018-8417)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8450
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8471
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8476
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8485
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8522
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8524
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8539
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8541 (to CVE-2018-8547)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8549 (to CVE-2018-8558)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8561 (to CVE-2018-8568)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8570
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8572 (to CVE-2018-8579)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8582
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8584
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8588
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8589
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8592
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8600
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8602
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8605 (to CVE-2018-8609)