January, 2020: Patch Tuesday: Last Month for Win 7 and Server 2008 Updates

Welcome to this January Patch Tuesday Bulletin, the first for 2020! This month we have 50 unique CVE’s, 5 technologies with critical updates, and no publicly disclosed or exploited vulnerabilities. While there were no known attacks in the wild it is important to pay attention to CVE-2020-0601. This vulnerability could allow an attacker to sign malicious executables using a spoofed code-signing certificate. Microsoft also acknowledged the National Security Agency for finding this vulnerability. Make sure that .NET, .NET Core, and ASP.NET vulnerabilities are updated since they are all rated critical. Follow up with Internet Explorer and then the technologies rated important. Microsoft also notes that support Windows 7, Server 2008, and Server 2008 R2 will end Jan 14.

Over the years we've had millions of visitors to UltimateWindowsSecurity.com. Every month we have thousands and thousands of visitors to our Security Log Encyclopedia which documents all of the Security Log event ID’s for Windows Server OS’s. Back in 2007 when SharePoint added auditing capability, I realized that my audience not only needed the event information from SharePoint but I also found a similar need in SQL Server and Exchange. So not only did I document the data but I also started to develop the means to extract that event data from these applications so that it’s accessible and useable to the end user. Some 8 years later and LOGbinder is continuing to grow as companies realize LOGbinder bridges the gap between these applications and their infosec team. Visit LOGbinder.com to download a free 30-day fully functional trial and see the security event data that you have literally been missing.

So, without further ado, here’s the chart of MS patches this month.

Patch data provided by:

Technology

Products Affected

Severity

Reference

Workaround/ Exploited

Vulnerability Info

Windows

Win 7, 8.1, RT 8.1, 10

Server 2008, 2012, 2012 R2, 2016, 2019

Critical

CVE-2020-0601

CVE-2020-0607

CVE-2020-0608

CVE-2020-0609

CVE-2020-0610

CVE-2020-0611

CVE-2020-0612

CVE-2020-0613

CVE-2020-0614

CVE-2020-0615

CVE-2020-0616

CVE-2020-0617

CVE-2020-0620

CVE-2020-0621

CVE-2020-0622

CVE-2020-0623

CVE-2020-0624

CVE-2020-0625

CVE-2020-0626

CVE-2020-0627

CVE-2020-0628

CVE-2020-0629

CVE-2020-0630

CVE-2020-0631

CVE-2020-0632

CVE-2020-0633

CVE-2020-0634

CVE-2020-0635

CVE-2020-0636

CVE-2020-0637

CVE-2020-0638

CVE-2020-0639

CVE-2020-0641

CVE-2020-0642

CVE-2020-0643

CVE-2020-0644

 

*Workaround: No

**Public: No

Exploited: No

Spoofing

Information Disclosure

Denial of Service

Elevation of Privilege

Remote Code Execution

Security Feature Bypass

 

Internet Explorer

IE 9, 10, 11

Critical

CVE-2020-0640

*Workaround: No

**Public: No

Exploited: No

Remote Code Execution

Microsoft Office, Office Services, Web Apps

Office 2010, 2013, 2016, 2016 for mac, 2019, 2019 for Mac

Excel 2010, 2013, 2016

SharePoint Enterprise Server 2016

SharePoint Foundation Server 2010, 2013

Office 365 ProPlus

Important

CVE-2019-1491

CVE-2020-0647

CVE-2020-0650

CVE-2020-0651

CVE-2020-0652

CVE-2020-0653

CVE-2020-0654

*Workaround: No

**Public: No

Exploited: No

Remote Code Execution

Spoofing

Security Feature Bypass

Information Disclosure

 

ASP.NET Core

ASP.NET Core 2.1, 3.0, 3.1

Critical

CVE-2020-0602

CVE-2020-0603

 

*Workaround: No

**Public: No

Exploited: No

Denial of Service

Remote Code Execution

 

.NET Core

.NET Core 3.0, 3.1

Critical

CVE-2020-0605

CVE-2020-0606

*Workaround: No

**Public: No

Exploited: No

Remote Code Execution

.NET Framework

.NET 3.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2,

 4.7, 4.7.1, 4.7.2, 4.8

Critical

CVE-2020-0605

CVE-2020-0606

CVE-2020-0646

 

*Workaround: No

**Public: No

Exploited: No

Remote Code Execution

OneDrive for Android

One Drive for Android

Important

CVE-2020-0654

*Workaround: No

**Public: No

Exploited: No

Security Feature Bypass

Microsoft Dynamics

Dynamics 365 Field Service (on-premises) v7 series

Important

CVE-2020-0656

*Workaround: No

**Public: No

Exploited: No

Spoofing