Published on: 13 May 2020
Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. The list of security updates can be found at:
https://support.microsoft.com/en-us/help/20200512/security-update-deployment-information-may-12-2020
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, elevation of privilege, denial of service, information disclosure, spoofing and security feature bypass.
Patches for affected products are available from the Windows Update / Microsoft Update Catalog. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/2020-May
https://support.microsoft.com/en-us/help/20200512/security-update-deployment-information-may-12-2020
https://www.hkcert.org/my_url/en/alert/20051301
https://www.us-cert.gov/ncas/current-activity/2020/05/12/microsoft-releases-may-2020-security-updates
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0901
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0909
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0963
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1023
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1028
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1035
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1037
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1051
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1056
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1060 (to CVE-2020-1072)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1075 (to CVE-2020-1079)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1084
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1086 (to CVE-2020-1088)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1092
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1099 (to CVE-2020-1114)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1116 (to CVE-2020-1118)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1123 (to CVE-2020-1126)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1132
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1134 (to CVE-2020-1145)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1149
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1150
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1153 (to CVE-2020-1158)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1161
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1164 (to CVE-2020-1166)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1171
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1173 (to CVE-2020-1176)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1179
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1184 (to CVE-2020-1192)