Published on: 10 July 2019
Microsoft has released security updates addressing multiple vulnerabilities and which affect several Microsoft products or components. The list of security updates can be found at:
https://support.microsoft.com/en-us/help/20190709/security-update-deployment-information-july-9-2019
Reports indicate active exploitation against the vulnerabilities in Microsoft Windows and Windows Server (CVE-2019-0880 and CVE-2019-1132) for privilege escalation have been observed. Users are advised to take immediate action to patch your affected systems to mitigate the elevated risk of cyber attacks.
A complete list of the affected products can be found at:
https://portal.msrc.microsoft.com/en-us/security-guidance
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, information disclosure, security feature bypass, elevation of privilege, spoofing and denial of service.
Patches for affected products are available from the Windows Update / Microsoft Update Catalog. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/48293f19-d662-e911-a98e-000d3a33c573
https://support.microsoft.com/en-us/help/20190709/security-update-deployment-information-july-9-2019
https://www.hkcert.org/my_url/en/alert/19071001
https://www.us-cert.gov/ncas/current-activity/2019/07/09/microsoft-releases-july-2019-security-updates
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV190020
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV190021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15664
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0785
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0811
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0865
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0880
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0887
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0962
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1004
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1006
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1037
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1056
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1062
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1067
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1071 (to CVE-2019-1077)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1079
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1082 (to CVE-2019-1104)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1106 (to CVE-2019-1113)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1116 (to CVE-2019-1124)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1126 (to CVE-2019-1130)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1132
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1134
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1136
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1137