Published on: 13 March 2019
Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. The list of security updates can be found at:
https://support.microsoft.com/en-us/help/20190312/security-update-deployment-information-march-12-2019
Reports indicate active exploitation against the vulnerabilities in Microsoft Windows and Windows Server (CVE-2019-0797 and CVE-2019-0808) have been observed. Users are advised to take immediate action to patch the affected systems to mitigate the elevated risk of cyber attacks.
A complete list of the affected products can be found at:
https://portal.msrc.microsoft.com/en-us/security-guidance
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, information disclosure, security feature bypass, elevation of privilege, spoofing, tampering and denial of service.
Patches for affected products are available from the Windows Update / Microsoft Update Catalog. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/ac45e477-1019-e911-a98b-000d3a33a34d
https://support.microsoft.com/en-us/help/20190312/security-update-deployment-information-march-12-2019
https://www.hkcert.org/my_url/en/alert/19031301
https://www.us-cert.gov/ncas/current-activity/2019/03/12/Microsoft-Releases-March-2019-Security-Updates
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV190009
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV190010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0592
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0603
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0611
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0612
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0614
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0665 (to CVE-2019-0667)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0678
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0682
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0683
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0692 (to CVE-2019-0698)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0701 (to CVE-2019-0704)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0746
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0748
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0754 (to CVE-2019-0757)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0759
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0761 (to CVE-2019-0763)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0765 (to CVE-2019-0780)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0782 (to CVE-2019-0784)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0797
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0798
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0809
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0821