Published on: 15 January 2020
Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. The list of security updates can be found at:
https://support.microsoft.com/en-us/help/20200114/
The January 2020 security updates released by Microsoft addressed a vulnerability (CVE-2020-0601) in the Microsoft CryptoAPI. The vulnerability affects both Microsoft Windows and Windows Server. Successful exploitation of the vulnerability could enable an attacker to sign a malicious executable with a forged Elliptic Curve Cryptography (ECC) certificate, making the executable appear to be from a trusted and legitimate source. Users are advised to take immediate action to patch your affected systems to mitigate the elevated risk of cyber attacks.
Please note that Microsoft announced that the extended support for Windows 7 has been ceased since 14 January 2020 and no security updates will be provided after that. Users should arrange upgrading the Windows to Windows 10 or migrating to other supported technology.
A complete list of the affected products can be found at:
https://portal.msrc.microsoft.com/en-us/security-guidance
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, information disclosure, spoofing, elevation of privilege, denial of service, and security feature bypass.
Patches for affected products are available from the Windows Update / Microsoft Update Catalog. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/2020-Jan
https://support.microsoft.com/en-us/help/20200114/
https://www.hkcert.org/my_url/en/alert/20011501
https://www.us-cert.gov/ncas/current-activity/2020/01/14/microsoft-releases-january-2020-security-updates
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0601 (to CVE-2020-0603)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0605 (to CVE-2020-0617)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0620 (to CVE-2020-0644)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0646
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0650 (to CVE-2020-0654)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0656