Published on: 11 September 2019
Microsoft has released security updates addressing multiple vulnerabilities and which affect several Microsoft products or components. The list of security updates can be found at:
https://support.microsoft.com/en-us/help/20190910/security-update-deployment
Microsoft released a security update (ADV990001) for a component in Windows Update, named Servicing Stack Updates. Microsoft recommends that installing the latest Servicing Stack Updates should take priority over adopting the latest cumulative update.
Reports indicate active exploitation against the vulnerabilities in Microsoft Windows and Windows Server (CVE-2019-1214 and CVE-2019-1215) for privilege escalation have been observed. Users are advised to take immediate action to patch the affected systems to mitigate the elevated risk of cyber attacks.
A complete list of the affected products can be found at:
https://portal.msrc.microsoft.com/en-us/security-guidance
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, information disclosure, spoofing, elevation of privilege, denial of service and security feature bypass.
Patches for affected products are available from the Windows Update / Microsoft Update Catalog. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/24f46f0a-489c-e911-a994-000d3a33c573
https://support.microsoft.com/en-us/help/20190910/security-update-deployment
https://www.hkcert.org/my_url/en/alert/19091101
https://www.us-cert.gov/ncas/current-activity/2019/09/10/microsoft-releases-september-2019-security-updates
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV190022
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV990001
https://docs.microsoft.com/en-us/windows/deployment/update/servicing-stack-updates
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0787
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0788
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0928
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1138
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1142
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1209
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1214 (to CVE-2019-1217)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1219 (to CVE-2019-1221)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1231 (to CVE-2019-1233)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1235 (to CVE-2019-1237)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1240 (to CVE-2019-1254)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1256
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1257
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1259 (to CVE-2019-1274)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1277
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1278
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1280
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1282 (to CVE-2019-1287)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1289 (to CVE-2019-1303)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1305
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1306