Published on: 13 February 2019
Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. The list of security updates can be found at:
https://support.microsoft.com/en-us/help/20190212/security-update-deployment-information
Reports indicate active exploitation against the vulnerability in Microsoft Internet Explorer (CVE-2019-0676) has been observed. Users are advised to take immediate action to patch the affected systems to mitigate the elevated risk of cyber attacks.
A complete list of the affected products can be found at:
https://portal.msrc.microsoft.com/en-us/security-guidance
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, elevation of privilege, information disclosure, security feature bypass and spoofing.
Patches for affected products are available from the Windows Update / Microsoft Update Catalog. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/51503ac5-e6d2-e811-a983-000d3a33c573
https://support.microsoft.com/en-us/help/20190212/security-update-deployment-information
https://www.hkcert.org/my_url/en/alert/19021301
https://www.us-cert.gov/ncas/current-activity/2019/02/12/Microsoft-Releases-February-2019-Security-Updates
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV190004
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV190006
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0540
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0590
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0591
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0593 (to CVE-2019-0602)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0604 (to CVE-2019-0607)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0613
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0615
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0619
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0623
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0625 (to CVE-2019-0628)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0630 (to CVE-2019-0637)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0640 (to CVE-2019-0645)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0648 (to CVE-2019-0652)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0654 (to CVE-2019-0662)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0664
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0668 (to CVE-2019-0676)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0724
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0728
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0729
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0741 (to CVE-2019-0743)