Overview
Microsoft released the May 2020 security patch on Tuesday that fixes 111 vulnerabilities ranging from simple spoofing attacks to remote code execution in various products, including .NET Core, .NET Framework, Active Directory, Common Log File System Driver, Internet Explorer, Microsoft Dynamics, Microsoft Edge, Microsoft Graphics Component, Microsoft JET Database Engine, Microsoft Office, Microsoft Office SharePoint, Microsoft Scripting Engine, Microsoft Windows, Power BI, Visual Studio, Windows Hyper-V, Windows Kernel, Windows Scripting, Windows Subsystem for Linux, Windows Task Scheduler, and Windows Update Stack.
Description of Critical Vulnerabilities
Microsoft fixed 15 critical vulnerabilities, five of which are described in detail as follows:
- CVE-2020-1023, CVE-2020-1024, CVE-2020-1069, and CVE-2020–1102
These are RCE vulnerabilities in the SharePoint. Attackers could exploit these vulnerabilities to execute arbitrary code on a victim machine or server. To successfully exploit the CVE-2020-1069 vulnerability, attackers need to upload a crafted package to the SharePoint server. To exploit the CVE-2020-1023, CVE-2020-1024, and CVE-2020–1102 vulnerabilities, attackers need to trick a user into opening a crafted SharePoint file.
- CVE-2020-1062
This is a memory corruption vulnerability in the Internet Explorer web browser. This vulnerability can be triggered when a user accesses a crafted web page controlled by the attacker. An attacker could exploit this vulnerability to corrupt the memory on the target machine and then execute arbitrary code in the context of the current user via a crafted web page. The security update addresses this vulnerability by modifying how Internet Explorer handles objects in memory.
Vulnerabilities
The following table lists these vulnerabilities.
Product | CVE ID | CVE Title | Severity Level |
Microsoft Graphics Component | CVE-2020-1117 | Microsoft Color Management Remote Code Execution Vulnerability | Critical |
Microsoft Graphics Component | CVE-2020-1153 | Microsoft Graphics Components Remote Code Execution Vulnerability | Critical |
Microsoft Office SharePoint | CVE-2020-1023 | Microsoft SharePoint Remote Code Execution Vulnerability | Critical |
Microsoft Office SharePoint | CVE-2020-1024 | Microsoft SharePoint Remote Code Execution Vulnerability | Critical |
Microsoft Office SharePoint | CVE-2020-1069 | Microsoft SharePoint Server Remote Code Execution Vulnerability | Critical |
Microsoft Office SharePoint | CVE-2020-1102 | Microsoft SharePoint Remote Code Execution Vulnerability | Critical |
Microsoft Scripting Engine | CVE-2020-1065 | Scripting Engine Memory Corruption Vulnerability | Critical |
Microsoft Windows | CVE-2020-1028 | Media Foundation Memory Corruption Vulnerability | Critical |
Microsoft Windows | CVE-2020-1126 | Media Foundation Memory Corruption Vulnerability | Critical |
Microsoft Windows | CVE-2020-1136 | Media Foundation Memory Corruption Vulnerability | Critical |
Visual Studio | CVE-2020-1192 | Visual Studio Code Python Extension Remote Code Execution Vulnerability | Critical |
Internet Explorer | CVE-2020-1064 | MSHTML Engine Remote Code Execution Vulnerability | Critical |
Internet Explorer | CVE-2020-1093 | VBScript Remote Code Execution Vulnerability | Critical |
Microsoft Edge | CVE-2020-1056 | Microsoft Edge Privilege Escalation Vulnerability | Critical |
Internet Explorer | CVE-2020-1062 | Internet Explorer Memory Corruption Vulnerability | Critical |
.NET Core | CVE-2020-1108 | .NET Core & .NET Framework Denial-of-Service Vulnerability | Important |
.NET Core | CVE-2020-1161 | ASP.NET Core Denial-of-Service Vulnerability | Important |
.NET Framework | CVE-2020-1066 | .NET Framework Privilege Escalation Vulnerability | Important |
Active Directory | CVE-2020-1055 | Microsoft Active Directory Federation Services Cross-Site Scripting Vulnerability | Important |
Common Log File System Driver | CVE-2020-1154 | Windows Common Log File System Driver Privilege Escalation Vulnerability | Important |
Microsoft Dynamics | CVE-2020-1063 | Microsoft Dynamics 365 (On-Premise) Cross Site Scripting Vulnerability | Important |
Microsoft Edge | CVE-2020-1059 | Microsoft Edge Spoofing Vulnerability | Important |
Microsoft Edge | CVE-2020-1096 | Microsoft Edge PDF Remote Code Execution Vulnerability | Important |
Microsoft Graphics Component | CVE-2020-0963 | Windows GDI Information Disclosure Vulnerability | Important |
Microsoft Graphics Component | CVE-2020-1054 | Win32k Privilege Escalation Vulnerability | Important |
Microsoft Graphics Component | CVE-2020-1135 | Windows Graphics Component Privilege Escalation Vulnerability | Important |
Microsoft Graphics Component | CVE-2020-1140 | DirectX Privilege Escalation Vulnerability | Important |
Microsoft Graphics Component | CVE-2020-1179 | Windows GDI Information Disclosure Vulnerability | Important |
Microsoft Graphics Component | CVE-2020-1141 | Windows GDI Information Disclosure Vulnerability | Important |
Microsoft Graphics Component | CVE-2020-1142 | Windows GDI Privilege Escalation Vulnerability | Important |
Microsoft Graphics Component | CVE-2020-1145 | Windows GDI Information Disclosure Vulnerability | Important |
Microsoft JET Database Engine | CVE-2020-1175 | Jet Database Engine Remote Code Execution Vulnerability | Important |
Microsoft JET Database Engine | CVE-2020-1051 | Jet Database Engine Remote Code Execution Vulnerability | Important |
Microsoft JET Database Engine | CVE-2020-1174 | Jet Database Engine Remote Code Execution Vulnerability | Important |
Microsoft JET Database Engine | CVE-2020-1176 | Jet Database Engine Remote Code Execution Vulnerability | Important |
Microsoft Office | CVE-2020-0901 | Microsoft Excel Remote Code Execution Vulnerability | Important |
Microsoft Office SharePoint | CVE-2020-1099 | Microsoft Office SharePoint XSS Vulnerability | Important |
Microsoft Office SharePoint | CVE-2020-1101 | Microsoft Office SharePoint XSS Vulnerability | Important |
Microsoft Office SharePoint | CVE-2020-1107 | Microsoft SharePoint Spoofing Vulnerability | Important |
Microsoft Office SharePoint | CVE-2020-1100 | Microsoft Office SharePoint XSS Vulnerability | Important |
Microsoft Office SharePoint | CVE-2020-1103 | Microsoft SharePoint Information Disclosure Vulnerability | Important |
Microsoft Office SharePoint | CVE-2020-1104 | Microsoft SharePoint Spoofing Vulnerability | Important |
Microsoft Office SharePoint | CVE-2020-1105 | Microsoft SharePoint Spoofing Vulnerability | Important |
Microsoft Office SharePoint | CVE-2020-1106 | Microsoft Office SharePoint XSS Vulnerability | Important |
Microsoft Windows | CVE-2020-1021 | Windows Error Reporting Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1010 | Microsoft Windows Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1048 | Windows Print Spooler Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1071 | Windows Remote Access Common Dialog Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1076 | Windows Denial-of-Service Vulnerability | Important |
Microsoft Windows | CVE-2020-1078 | Windows Installer Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1084 | Connected User Experiences and Telemetry Service Denial-of-Service Vulnerability | Important |
Microsoft Windows | CVE-2020-1116 | Windows CSRSS Information Disclosure Vulnerability | Important |
Microsoft Windows | CVE-2020-1118 | Microsoft Windows Transport Layer Security Denial-of-Service Vulnerability | Important |
Microsoft Windows | CVE-2020-1124 | Windows State Repository Service Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1134 | Windows State Repository Service Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1137 | Windows Push Notification Service Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1138 | Windows Storage Service Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1143 | Win32k Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1144 | Windows State Repository Service Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1149 | Windows Runtime Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1150 | Media Foundation Memory Corruption Vulnerability | Important |
Microsoft Windows | CVE-2020-1151 | Windows Runtime Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1155 | Windows Runtime Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1156 | Windows Runtime Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1157 | Windows Runtime Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1158 | Windows Runtime Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1186 | Windows State Repository Service Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1189 | Windows State Repository Service Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1190 | Windows State Repository Service Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1067 | Windows Remote Code Execution Vulnerability | Important |
Microsoft Windows | CVE-2020-1068 | Microsoft Windows Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1070 | Windows Print Spooler Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1072 | Windows Kernel Information Disclosure Vulnerability | Important |
Microsoft Windows | CVE-2020-1077 | Windows Runtime Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1079 | Microsoft Windows Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1081 | Windows Printer Service Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1082 | Windows Error Reporting Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1086 | Windows Runtime Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1088 | Windows Error Reporting Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1090 | Windows Runtime Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1111 | Windows Clipboard Service Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1112 | Windows Background Intelligent Transfer Service Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1121 | Windows Clipboard Service Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1123 | Connected User Experiences and Telemetry Service Denial-of-Service Vulnerability | Important |
Microsoft Windows | CVE-2020-1125 | Windows Runtime Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1131 | Windows State Repository Service Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1132 | Windows Error Reporting Manager Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1139 | Windows Runtime Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1164 | Windows Runtime Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1165 | Windows Clipboard Service Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1166 | Windows Clipboard Service Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1184 | Windows State Repository Service Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1185 | Windows State Repository Service Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1187 | Windows State Repository Service Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1188 | Windows State Repository Service Privilege Escalation Vulnerability | Important |
Microsoft Windows | CVE-2020-1191 | Windows State Repository Service Privilege Escalation Vulnerability | Important |
Power BI | CVE-2020-1173 | Microsoft Power BI Report Server Spoofing Vulnerability | Important |
Visual Studio | CVE-2020-1171 | Visual Studio Code Python Extension Remote Code Execution Vulnerability | Important |
Windows Hyper-V | CVE-2020-0909 | Windows Hyper-V Denial-of-Service Vulnerability | Important |
Windows Kernel | CVE-2020-1114 | Windows Kernel Privilege Escalation Vulnerability | Important |
Windows Kernel | CVE-2020-1087 | Windows Kernel Privilege Escalation Vulnerability | Important |
Windows Scripting | CVE-2020-1061 | Microsoft Script Runtime Remote Code Execution Vulnerability | Important |
Windows Subsystem for Linux | CVE-2020-1075 | Windows Subsystem for Linux Information Disclosure Vulnerability | Important |
Windows Task Scheduler | CVE-2020-1113 | Windows Task Scheduler Security Feature Bypass Vulnerability | Important |
Windows Update Stack | CVE-2020-1110 | Windows Update Stack Privilege Escalation Vulnerability | Important |
Windows Update Stack | CVE-2020-1109 | Windows Update Stack Privilege Escalation Vulnerability | Important |
Internet Explorer | CVE-2020-1092 | Internet Explorer Memory Corruption Vulnerability | Low |
Microsoft Scripting Engine | CVE-2020-1035 | VBScript Remote Code Execution Vulnerability | Low |
Microsoft Scripting Engine | CVE-2020-1058 | VBScript Remote Code Execution Vulnerability | Low |
Microsoft Scripting Engine | CVE-2020-1060 | VBScript Remote Code Execution Vulnerability | Low |
Microsoft Scripting Engine | CVE-2020-1037 | Chakra Scripting Engine Memory Corruption Vulnerability | Moderate |
Recommended Mitigation Measures
Microsoft has released security updates to fix these issues. Please download and install them as soon as possible.
Affected Software
The following tables list the affected software details for the vulnerability.
CVE-2020-1192 | ||||||
Product | KB Article | Severity | Impact | Supersedence | CVSS Score Set | Restart Required |
Visual Studio Code | Release Notes Security Update | Critical | Remote Code Execution | Base: N/A Temporal: N/A Vector: N/A | Maybe |
Statement
This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and/or indirect consequences and losses caused by transmitting and/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add/delete any information to/from it, or use this advisory for commercial purposes without permission from NSFOCUS.
About NSFOCUS
NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks. The company’s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide multi-layered, unified and dynamic protection against advanced cyber attacks.
NSFOCUS works with Fortune Global 500 companies, including four of the world’s five largest financial institutions, organizations in insurance, retail, healthcare, critical infrastructure industries as well as government agencies. NSFOCUS has technology and channel partners in more than 60 countries, is a member of both the Microsoft Active Protections Program (MAPP), and the Cloud Security Alliance (CSA).
A wholly owned subsidiary of NSFOCUS Technologies Group Co., Ltd., the company has operations in the Americas, Europe, the Middle East and Asia Pacific.
Download: