Published on: 10 June 2020
Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. The list of security updates can be found at:
https://support.microsoft.com/en-us/help/20200609/security-update-deployment-information-june-9-2020
The June 2020 security updates released by Microsoft addressed a vulnerability (CVE-2020-1206) in Server Message Block (SMB) protocol. The vulnerability affects Windows 10 as well as Windows Server, version 1903, 1909 and 2004. Successful exploitation of the vulnerability could allow an unauthenticated remote attacker to leak kernel memory on a targeted SMB Server or SMB Client. Users are advised to apply the latest security update on the affected systems immediately to mitigate the elevated risk of cyber attacks.
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, elevation of privilege, denial of service, information disclosure, spoofing and security feature bypass.
Patches for affected products are available from the Windows Update / Microsoft Update Catalog. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
https://support.microsoft.com/en-us/help/20200609/security-update-deployment-information-june-9-2020
https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/2020-Jun
https://www.hkcert.org/my_url/en/alert/20061001
https://www.us-cert.gov/ncas/current-activity/2020/06/09/microsoft-releases-june-2020-security-updates
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0915
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0916
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0986
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1073
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1120
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1148
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1160
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1163
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1170
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1178
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1181
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1183
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1194
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1196
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1197
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1199
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1201 (to CVE-2020-1204)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1206 (to CVE-2020-1209)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1211 (to CVE-2020-1217)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1219 (to CVE-2020-1223)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1225
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1229 (to CVE-2020-1239)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1242
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1244
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1246 (to CVE-2020-1248)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1251
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1253 (to CVE-2020-1255)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1257 (to CVE-2020-1266)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1268 (to CVE-2020-1284)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1286
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1287
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1289 (to CVE-2020-1302)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1304 (to CVE-2020-1307)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1309 (to CVE-2020-1318)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1320 (to CVE-2020-1324)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1327 (to CVE-2020-1329)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1331
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1334
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1340
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1343
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1348