Published on: 12 February 2020
Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. The list of security updates can be found at:
https://support.microsoft.com/en-us/help/20200211/security-update-deployment-information-february-11-2020
Reports indicate that active exploitation against the vulnerability in Microsoft Internet Explorer (CVE-2020-0674) for remote code execution have been observed. Users are advised to take immediate action to patch your affected systems to mitigate the elevated risk of cyber attacks.
Please note that Microsoft announced that the extended support for Windows 7 has been ceased since 14 January 2020 and no security updates will be provided after that. Users should arrange upgrading the Windows to Windows 10 or migrating to other supported technology.
A complete list of the affected products can be found at:
https://portal.msrc.microsoft.com/en-us/security-guidance
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, elevation of privilege, denial of service, information disclosure, security feature bypass, spoofing and tampering.
Patches for affected products are available from the Windows Update / Microsoft Update Catalog. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/2020-Feb
https://support.microsoft.com/en-us/help/20200211/security-update-deployment-information-february-11-2020
https://www.hkcert.org/my_url/en/alert/20021201
https://www.us-cert.gov/ncas/current-activity/2020/02/11/microsoft-releases-february-2020-security-updates
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200003
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0655
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0657 (to CVE-2020-0663)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0665 (to CVE-2020-0683)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0685
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0688
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0691 (to CVE-2020-0698)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0701 (to CVE-2020-0717)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0719 (to CVE-2020-0757)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0759
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0767
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0792
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0818