Published on: 13 November 2019
Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. The list of security updates can be found at:
https://support.microsoft.com/en-us/help/20191112/security-update-deployment-information-november-12-2019
Reports indicate that active exploitation against the vulnerability in Microsoft Internet Explorer (CVE-2019-1429) for remote code execution have been observed. Users are advised to take immediate action to patch your affected systems to mitigate the elevated risk of cyber attacks.
Please note that Microsoft announced that the extended support for Windows 7 will be ceased on 14 January 2020 and no security updates will be provided after that. Users should arrange upgrading the Windows to Windows 10 or migrating to other supported technology.
A complete list of the affected products can be found at:
https://portal.msrc.microsoft.com/en-us/security-guidance
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, information disclosure, spoofing, elevation of privilege, denial of service and security feature bypass.
Patches for affected products are available from the Windows Update / Microsoft Update Catalog. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/164aa83e-499c-e911-a994-000d3a33c573
https://support.microsoft.com/en-us/help/20191112/security-update-deployment-information-november-12-2019
https://www.hkcert.org/my_url/en/alert/19111301
https://www.us-cert.gov/ncas/current-activity/2019/11/12/microsoft-releases-november-2019-security-updates
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12207
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0721
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1309
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1310
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1324
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1373
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1374
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1379 (to CVE-2019-1385)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1388 (to CVE-2019-1399)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1402
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1405 (to CVE-2019-1409)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1411 (to CVE-2019-1420)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1422 (to CVE-2019-1430)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1432 (to CVE-2019-1443)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1445 (to CVE-2019-1449)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1456
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11135