Published on: 12 December 2018
Last update on: 28 December 2018
Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. The list of security updates can be found at:
https://support.microsoft.com/en-us/help/20181211/security-update-deployment-information-december-11-2018
The proof-of-concept exploit code of the vulnerability CVE-2018-8629 has been publicly available, attacks against any of the vulnerable systems are highly likely from now on.
Reports indicate active exploitation against vulnerability in Windows kernel (CVE-2018-8611) has been observed. Users are advised to take immediate action to patch the affected systems since there is elevated risk of cyber attacks for the vulnerabilities.
A complete list of the affected products can be found at:
https://portal.msrc.microsoft.com/en-us/security-guidance
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, elevation of privilege, information disclosure, tampering, denial of service and spoofing.
Patches for affected products are available from the Windows Update / Microsoft Update Catalog. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8629
https://github.com/phoenhex/files/blob/master/pocs/cve-2018-8629-chakra.js
https://www.bleepingcomputer.com/news/security/demo-exploit-code-published-for-remote-code-execution-via-microsoft-edge/
https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/6c54acc6-2ed2-e811-a980-000d3a33a34d
https://support.microsoft.com/en-us/help/20181211/security-update-deployment-information-december-11-2018
https://www.hkcert.org/my_url/en/alert/18121201
https://www.us-cert.gov/ncas/current-activity/2018/12/11/Microsoft-Releases-December-2018-Security-Updates
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8514
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8540
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8580
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8583
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8587
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8595 (to CVE-2018-8599)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8604
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8611 (to CVE-2018-8612)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8617 (to CVE-2018-8619)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8621 (to CVE-2018-8622)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8624 (to CVE-2018-8629)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8631
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8634 (to CVE-2018-8639)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8641
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8643
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8649
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8650 (to CVE-2018-8652)