February, 2020: Patch Tuesday: IE Zero-Day Updated

Welcome to this February Patch Tuesday Bulletin. This month we have 99 unique CVE’s, 9 technologies with updates, 4 technologies with critical updates, 5 publicly disclosed vulnerabilities, and a zero day vulnerability patched. The big news this month is the IE update that fixes a zero day vulnerability originally described in ADV200001. Take a look at CVE-2020-0674 and make sure that IE is updated. This vulnerability was issued Jan 17th, was known to be actively attacked, and could be exploited by navigating to a maliciously crafted website. Of the 3 additional publicly disclosed vulnerabilities (CVE-2020-0683, CVE-2020-0686, CVE-2020-0689, CVE-2020-0706) pay attention to CVE-2020-0689 which has standalone security updates. Microsoft states “These packages must be installed in addition to the normal security updates to be protected from this vulnerability”. This update fixes a security bypass for secure boot.

Over the years we've had millions of visitors to UltimateWindowsSecurity.com. Every month we have thousands and thousands of visitors to our Security Log Encyclopedia which documents all of the Security Log event ID’s for Windows Server OS’s. Back in 2007 when SharePoint added auditing capability, I realized that my audience not only needed the event information from SharePoint but I also found a similar need in SQL Server and Exchange. So not only did I document the data but I also started to develop the means to extract that event data from these applications so that it’s accessible and useable to the end user. Some 8 years later and LOGbinder is continuing to grow as companies realize LOGbinder bridges the gap between these applications and their infosec team. Visit LOGbinder.com to download a free 30-day fully functional trial and see the security event data that you have literally been missing.

So, without further ado, here’s the chart of MS patches this month.

Patch data provided by:

Technology

Products Affected

Severity

Reference

Workaround/ Exploited

Vulnerability Info

Windows

Win 7, 8.1, RT 8.1, 10

Server 2008, 2012, 2016, 2019

Critical

CVE-2020-0655

CVE-2020-0657

CVE-2020-0658

CVE-2020-0659

CVE-2020-0660

CVE-2020-0661

CVE-2020-0662

CVE-2020-0665

CVE-2020-0666

CVE-2020-0667

CVE-2020-0668

CVE-2020-0669

CVE-2020-0670

CVE-2020-0671

CVE-2020-0672

CVE-2020-0675

CVE-2020-0676

CVE-2020-0677

CVE-2020-0678

CVE-2020-0679

CVE-2020-0680

CVE-2020-0681

CVE-2020-0682

CVE-2020-0683**

CVE-2020-0685

CVE-2020-0686**

CVE-2020-0689**

CVE-2020-0691

CVE-2020-0698

CVE-2020-0701

CVE-2020-0703

CVE-2020-0704

CVE-2020-0705

CVE-2020-0707

CVE-2020-0708

CVE-2020-0709

CVE-2020-0714

CVE-2020-0715

CVE-2020-0716

CVE-2020-0717

CVE-2020-0719

CVE-2020-0720

CVE-2020-0721

CVE-2020-0722

CVE-2020-0723

CVE-2020-0724

CVE-2020-0725

CVE-2020-0726

CVE-2020-0727

CVE-2020-0728

CVE-2020-0729

CVE-2020-0730

CVE-2020-0731

CVE-2020-0732

CVE-2020-0734

CVE-2020-0735

CVE-2020-0736

CVE-2020-0737

CVE-2020-0738

CVE-2020-0739

CVE-2020-0740

CVE-2020-0741

CVE-2020-0742

CVE-2020-0743

CVE-2020-0744

CVE-2020-0745

CVE-2020-0746

CVE-2020-0747

CVE-2020-0748

CVE-2020-0749

CVE-2020-0750

CVE-2020-0751

CVE-2020-0752

CVE-2020-0753

CVE-2020-0754

CVE-2020-0755

CVE-2020-0756

CVE-2020-0757

CVE-2020-0792

 

*Workaround: No

**Public: Yes

Exploited: No

Remote Code Execution

Elevation of Privilege

Denial of Service

Information Disclosure

Security Feature Bypass

 

Edge

Microsoft Edge (EdgeHTML-based)

Critical

CVE-2020-0663

CVE-2020-0706

CVE-2020-0710

CVE-2020-0711

CVE-2020-0712

CVE-2020-0713

CVE-2020-0767

*Workaround: No

**Public: No

Exploited: No

Remote Code Execution

Elevation of Privilege

Information Disclosure

 

ChakraCore

ChakraCore

Critical

CVE-2020-0710

CVE-2020-0711

CVE-2020-0712

CVE-2020-0713

CVE-2020-0767

*Workaround: No

**Public: No

Exploited: No

Remote Code Execution

Internet Explorer

IE 9, 10, 11

Critical

CVE-2020-0673

CVE-2020-0674

CVE-2020-0706**

*Workaround: No

**Public: Yes

Exploited: Yes

Remote Code Execution

Information Disclosure

Exchange Server

Exchange Server 2010, 2013, 2016, 2019

Important

CVE-2020-0692

CVE-2020-0688

*Workaround: No

**Public: No

Exploited: No

Elevation of Privilege

Remote Code Execution

SQL Server

SQL Server 2012, 2014, 2016

Important

CVE-2020-0618

*Workaround: No

**Public: No

Exploited: No

Remote Code Execution

Office, Office Services and Web Apps

Excel 2010, 2013, 2016, 2019

Outlook 2010, 2013, 2016

SharePoint Enterprise Server 2016

SharePoint Server 2013, 2019

Office 365 ProPlus

Important

CVE-2020-0693

CVE-2020-0694

CVE-2020-0695

CVE-2020-0696

CVE-2020-0697

CVE-2020-0759

*Workaround: No

**Public: No

Exploited: No

Spoofing

Remote Code Execution

Security Feature Bypass

Tampering

 

Malicious Software Removal Tool

All

Important

CVE-2020-0733

*Workaround: No

**Public: No

Exploited: No

Elevation of Privilege

Surface Hub

All

Important

CVE-2020-0702

*Workaround: No

**Public: No

Exploited: No

Security Feature Bypass