Skip to main content
Tag

third-party patching

||

Adobe Patches Released for New Critical Flaws

By Patch Management

Adobe Patches Released for New Critical Flaws

Adobe has released dozens of critical patches this week, addressing 42 separate CVEs in its regularly scheduled February updates.

Adobe Puts Out Dozens of Patches

Adobe has released dozens of patches this week, addressing 42 separate CVEs in its regularly scheduled February updates, with 35 of the flaws rated as Critical severity.

The full release includes a total of five of Adobe’s widely-used software:

  • Adobe Acrobat and Reader
  • Adobe Digital Edition
  • Adobe Experience Manager
  • Adobe Flash Player
  • Adobe Framemaker

“This update addresses multiple critical vulnerabilities,” Adobe stated in its security bulletin. “Successful exploitation could lead to arbitrary code execution in the context of the current user.”

Fixing Framemaker

The majority of the fixes (21) impact Adobe Framemaker, a document processor designed for writing and editing large or complex documents, according to a security advisory published on Tuesday.

The Framemaker flaws include buffer errors, heap overflow problems, out-of-bounds write, and memory corruption issues; any of which can lead to the execution of arbitrary code. Adobe Framemaker versions 2019.0.4 and below (for Windows) are affected and thus a patch has been published for version 2019.0.5.

Exploring the Vulnerabilities

Adobe Acrobat and Reader for Windows and macOS also contain 12 similar code execution vulnerabilities. These vulnerabilities include heap overflow, buffer errors, use-after-free flaws, and privilege escalation bugs.

Just like with Framemaker bugs, if exploited, these can lead to arbitrary code execution and file system writes. Adobe also remediated 3 important out-of-bounds read issues leading to information disclosure and 2 moderate stack exhaustion vulnerabilities that could be easily exploited to cause memory leaks.

The latest update for Adobe Flash Player, potentially one of the most infamous applications in terms of having a horrible security record, has a critical arbitrary code execution flaw. If exploited, the flaw could allow hackers to compromise targeted Windows, macOS, Linux, and Chrome OS-based devices.

Adobe’s Digital Edition, an eBook reader application, also has a critical and an important flaw in versions 4.5.10 and below. The critical flaw stems from a command-injection glitch (CVE-2020-3760) allowing potential arbitrary code execution. Command-injection attacks are possible when an application passes unsafe user supplied data (such as forms or HTTP headers) to a system shell.

Last, but possibly least, Adobe Experience Manager, Adobe’s content management solution, has an important-level uncontrolled resource consumption vulnerability (CVE-2020-3741) that could result in a denial-of-service condition.

Patching the Problems

Though none of the software vulnerabilities resolved this month were publicly disclosed or appear to have been exploited in the wild, all of the products mentioned above should be patched as soon as possible.

For a “one-stop-shop” with vulnerability scanning, patch management and endpoint detection and response in one package, look no further than Syxsense Secure. Available as a standalone software product or alongside 24/7 managed services from our dedicated, experienced team.

The similarly comprehensive Syxsense Manage solution offers additional endpoint, OS and patch management, oversight to complete the picture of meticulous and wide-ranging threat management.

Begin your organization’s journey toward airtight endpoint security with a free trial of Syxsense’s products and services.

Experience the Power of Syxsense

Syxsense has created innovative and intuitive technology that sees and knows everything. Manage and secure your environment with a simple and powerful solution.

Syxsense demo

Schedule Your Syxsense Demo

Syxsense combines IT management, patch management, and security vulnerability scanning in one powerful solution. Get started today.

Schedule My Demo
||

Google Reveals Severe Zero-Day Vulnerabilities in Chrome

By Patch Management

Google Reveals Severe Zero-Day Vulnerabilities in Chrome

Google has released a software update to the Chrome browser that patches two severe zero-day vulnerabilities that could allow the browser to be hijacked.

Zero-Day Vulnerabilities Found in Google Chrome

Google has released a software update to the Chrome browser that patches two zero-day vulnerabilities that could potentially allow the browser to be hijacked by attackers.

One flaw affects the browser’s audio component (CVE-2019-13720) while the other vulnerability affects the PDFium library (CVE-2019-13721).

Google is urging users to update to the latest version as soon as possible. This includes Windows, Mac, and Linux devices as the version rolls out over the next few days.

“This version addresses vulnerabilities that an attacker could exploit to take control of an affected system, “ stated the Cybersecurity and Infrastructure Security Agency alert. “One of these vulnerabilities (CVE-2019-13720) was detected in exploits in the wild. The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the Chrome Release and apply the necessary updates.”

Prevent Arbitrary Code Execution

The main bug (CVE-2019-13720) is a user-after-free flaw – a memory corruption flaw where an attempt is made to access memory after it has been freed. This typically causes a slew of malicious impacts from causing programs to become instable as well as potentially leading to execution of arbitrary code; sometimes even enabling full remote code execution capabilities.

The second bug (CVE-2019-13721) was discovered in the PDFium library, which was developed by Foxit and Google and provides developers with capabilities to leverage an open-source software library for viewing and searching PDF documents. This vulnerability is also considered use-after-free but has received no reports of it being exploited in the wild. It was disclosed by a researcher under the alias “bananapenguin” who received a $7500 bounty through Google’s vulnerability disclosure program.

These are considered the second round of Chrome zero-days detected this year, since back in March, Google patched another Chrome zero-day (CVE-2019-5786) which was being used together with a Windows 7 zero-day (CVE-2019-0859).

Google has stated that the update to the browser will be rolling out to users automatically over the coming days; however, all Chrome users should opt for a manual update as soon as possible.

How to Manage Chrome Vulnerabilities

Leveraging a systems management solution with an up-to-date library of third-party products could easily alleviate the issue across organizations. Syxsense provides Chrome updates same-day and allows for an exceptionally smooth process with a Patch Deploy task.

Simply target all devices for the newest Chrome 78 update and the pre-packaged detection will determine if devices do/do not require the update; if they require it, the update will be automatically applied and the vulnerability remediated.

Experience the Power of Syxsense

Syxsense has created innovative and intuitive technology that sees and knows everything. Manage and secure your environment with a simple and powerful solution.

Syxsense demo

Schedule Your Syxsense Demo

Syxsense combines IT management, patch management, and security vulnerability scanning in one powerful solution. Get started today.

Schedule My Demo
||

UPDATED: VLC Player Hit With Critical Vulnerability

By News, Patch Management

VLC Player Hit With Critical Vulnerability

VLC Media Player has a critical security flaw that could put millions of users at risk.

UPDATE July 25, 2019, 11:55 BST

The recent CVE Security Vulnerability issued for the VNC video player maybe incorrect according to a recent tweet by VideoLAN
“About the “security issue” on #VLC : VLC is not vulnerable.
tl;dr: the issue is in a 3rd party library, called libebml, which was fixed more than 16 months ago.
VLC since version 3.0.3 has the correct version shipped, and @MITREcorp did not even check their claim.
This brings up some interesting questions:
1. Can we trust CVE?
2. A possible bigger issue is, we not only have to worry about the security vulnerabilities in the products we use, but also the 3rd Party Libraries those vendors choose to include in their products.

The free and open-source VLC media player has a critical-severity bug that allows for RCE (remote code execution) which potentially allows attackers to install, modify, or run software without authorization.

The latest vulnerability could put millions of users at risk, pointed-out by security researchers from German firm, CERT-Bund, and so far the software has been downloaded more than a billion times across the world. Categorized as CVE-2019-13615, the vulnerability is rated at 9.8/10 by NIST (National Institute of Standards and Technology) and was discovered in the latest version, VLC 3.0.7.1.

The vulnerability has been detected in Windows, Linux, and Unix versions of VLC Media Player.

Vulnerabilities such as this allow not only for disruption of service and unauthorized modification, but are a catalyst for greater concerns like ransomware,” says Jon Cassell, Senior Solutions Architect at Verismic Software, Inc. “So far, there still doesn’t appear to be any updates to remediate the bug, although VLC has already been made aware and are working on a patch. Our best recommendation, for now, would be to uninstall the software entirely until the situation is alleviated.”

Syxsense has the innate ability to show all devices with VLC Media Player installed, as well as includes the latest VLC Media Player software updates for easy remediation. Simply target all devices, select Patch Now, and choose the latest VLC Media Player updates. Also included is the action to entirely uninstall the software from any target devices and it’s just as easily as updating. When the task is complete, you’ll have full assurance that the vulnerability no longer applies.

Start a Free Trial

Try Syxsense today and start patching your IT environment with a powerful and easy-to-use IT management toolset.

Syxsense demo

Schedule Your Syxsense Demo

Syxsense combines IT management, patch management, and security vulnerability scanning in one powerful solution. Get started today.

Schedule My Demo
||

June Patch Tuesday: WSUS Needs Your Attention

By News, Patch Management, Patch Tuesday

June Patch Tuesday: WSUS Needs Your Attention

Microsoft has released 91 patches today—the largest release of the year so far. For those using WSUS 3.0 SP2, one update must be manually installed.

Patch Tuesday Release

Microsoft have released 91 patches today covering IE, Edge, ChakraCore, Skype, Windows and Office. There are 21 rated Critical and 66 Important, which so far this year is the largest release of this year. Thankfully no updates in this release are being exploited yet, but the sheer number of updates will certainly keep your IT manager busy this month.

Urgent – WSUS needs your manual attention for KB4484071

Microsoft is continuing its SHA1 to SHA2 signing process this month, with two planned changes. Windows 10 updates are automatic, but for those customers using WSUS 3.0 SP2, KB4484071 must be manually installed to support SHA2 updates.

Robert Brown, Director of Services said, “This has caught a lot of our readers out over the past few months. If your device does not support SHA2, you are not downloading the latest content which is making your devices safe.”

Could CVE-2019-1069 be the next BlueKeep?

Many of our IT staff utilize the Windows Scheduler to perform complex software installations, as it is super useful for installing software following complex reboot operations or installing software when there is no user logged on. Both our Cyber Security Analysts and other respected insider peers are highly concerned that this “Publicly Disclosed” vulnerability could be the next BlueKeep threat, due to the potential catastrophic exploit potential of this threat.

Adobe Updates

Thankfully, unlike Microsoft Adobe have only released 10 updates for Reader and Flash Player. All updates are Critical or Important priority 2 meaning IT Admins should install these updates within the next 30 days.

We have made a few recommendations below which you should prioritize, use Syxsense to organize and deploy Windows, third-party, Mac OS and Linux updates to keep your environment safe.

Patch Tuesday Release

Verismic Recommended CVE Identity Description / Type Severity Publicly Discovered Actively Being Exploited
Yes CVE-2019-1069 Task Scheduler Elevation of Privilege Vulnerability Important Yes No
Yes CVE-2019-1064 Windows Elevation of Privilege Vulnerability Important Yes No
Yes CVE-2019-0973 Windows Installer Elevation of Privilege Vulnerability Important Yes No
Yes CVE-2019-1053 Windows Shell Elevation of Privilege Vulnerability Important Yes No
Yes CVE-2019-0990 Scripting Engine Information Disclosure Vulnerability Critical No No
Yes CVE-2019-1023 Scripting Engine Information Disclosure Vulnerability Critical No No
Yes CVE-2019-0888 ActiveX Data Objects (ADO) Remote Code Execution Vulnerability Critical No No
Yes CVE-2019-0989 Chakra Scripting Engine Memory Corruption Vulnerability Critical No No
Yes CVE-2019-0991 Chakra Scripting Engine Memory Corruption Vulnerability Critical No No
Yes CVE-2019-0992 Chakra Scripting Engine Memory Corruption Vulnerability Critical No No
Yes CVE-2019-0993 Chakra Scripting Engine Memory Corruption Vulnerability Critical No No
Yes CVE-2019-1002 Chakra Scripting Engine Memory Corruption Vulnerability Critical No No
Yes CVE-2019-1003 Chakra Scripting Engine Memory Corruption Vulnerability Critical No No
Yes CVE-2019-1024 Chakra Scripting Engine Memory Corruption Vulnerability Critical No No
Yes CVE-2019-1051 Chakra Scripting Engine Memory Corruption Vulnerability Critical No No
Yes CVE-2019-1052 Chakra Scripting Engine Memory Corruption Vulnerability Critical No No
Yes CVE-2019-1038 Microsoft Browser Memory Corruption Vulnerability Critical No No
Yes CVE-2019-0985 Microsoft Speech API Remote Code Execution Vulnerability Critical No No
Yes CVE-2019-1080 Scripting Engine Memory Corruption Vulnerability Critical No No
Yes CVE-2019-0920 Scripting Engine Memory Corruption Vulnerability Critical No No
Yes CVE-2019-0988 Scripting Engine Memory Corruption Vulnerability Critical No No
Yes CVE-2019-1055 Scripting Engine Memory Corruption Vulnerability Critical No No
Yes CVE-2019-0620 Windows Hyper-V Remote Code Execution Vulnerability Critical No No
Yes CVE-2019-0709 Windows Hyper-V Remote Code Execution Vulnerability Critical No No
Yes CVE-2019-0722 Windows Hyper-V Remote Code Execution Vulnerability Critical No No
CVE-2019-0972 Local Security Authority Subsystem Service Denial of Service Vulnerability Important No No
CVE-2019-0941 Microsoft IIS Server Denial of Service Vulnerability Important No No
CVE-2019-1029 Skype for Business and Lync Server Denial of Service Vulnerability Important No No
CVE-2019-1025 Windows Denial of Service Vulnerability Important No No
CVE-2019-0710 Windows Hyper-V Denial of Service Vulnerability Important No No
CVE-2019-0711 Windows Hyper-V Denial of Service Vulnerability Important No No
CVE-2019-0713 Windows Hyper-V Denial of Service Vulnerability Important No No
CVE-2019-1018 DirectX Elevation of Privilege Vulnerability Important No No
CVE-2019-0960 Win32k Elevation of Privilege Vulnerability Important No No
CVE-2019-1014 Win32k Elevation of Privilege Vulnerability Important No No
CVE-2019-1017 Win32k Elevation of Privilege Vulnerability Important No No
CVE-2019-0943 Windows ALPC Elevation of Privilege Vulnerability Important No No
CVE-2019-1007 Windows Audio Service Elevation of Privilege Vulnerability Important No No
CVE-2019-1021 Windows Audio Service Elevation of Privilege Vulnerability Important No No
CVE-2019-1022 Windows Audio Service Elevation of Privilege Vulnerability Important No No
CVE-2019-1026 Windows Audio Service Elevation of Privilege Vulnerability Important No No
CVE-2019-1027 Windows Audio Service Elevation of Privilege Vulnerability Important No No
CVE-2019-1028 Windows Audio Service Elevation of Privilege Vulnerability Important No No
CVE-2019-0959 Windows Common Log File System Driver Elevation of Privilege Vulnerability Important No No
CVE-2019-0984 Windows Common Log File System Driver Elevation of Privilege Vulnerability Important No No
CVE-2019-1041 Windows Kernel Elevation of Privilege Vulnerability Important No No
CVE-2019-1065 Windows Kernel Elevation of Privilege Vulnerability Important No No
CVE-2019-1045 Windows Network File System Elevation of Privilege Vulnerability Important No No
CVE-2019-0983 Windows Storage Service Elevation of Privilege Vulnerability Important No No
CVE-2019-0998 Windows Storage Service Elevation of Privilege Vulnerability Important No No
CVE-2019-0986 Windows User Profile Service Elevation of Privilege Vulnerability Important No No
CVE-2019-1081 Microsoft Browser Information Disclosure Vulnerability Important No No
CVE-2019-0968 Windows GDI Information Disclosure Vulnerability Important No No
CVE-2019-0977 Windows GDI Information Disclosure Vulnerability Important No No
CVE-2019-1009 Windows GDI Information Disclosure Vulnerability Important No No
CVE-2019-1010 Windows GDI Information Disclosure Vulnerability Important No No
CVE-2019-1011 Windows GDI Information Disclosure Vulnerability Important No No
CVE-2019-1012 Windows GDI Information Disclosure Vulnerability Important No No
CVE-2019-1013 Windows GDI Information Disclosure Vulnerability Important No No
CVE-2019-1015 Windows GDI Information Disclosure Vulnerability Important No No
CVE-2019-1016 Windows GDI Information Disclosure Vulnerability Important No No
CVE-2019-1046 Windows GDI Information Disclosure Vulnerability Important No No
CVE-2019-1047 Windows GDI Information Disclosure Vulnerability Important No No
CVE-2019-1048 Windows GDI Information Disclosure Vulnerability Important No No
CVE-2019-1049 Windows GDI Information Disclosure Vulnerability Important No No
CVE-2019-1050 Windows GDI Information Disclosure Vulnerability Important No No
CVE-2019-1039 Windows Kernel Information Disclosure Vulnerability Important No No
CVE-2019-1043 Comctl32 Remote Code Execution Vulnerability Important No No
CVE-2019-0904 Jet Database Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0905 Jet Database Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0906 Jet Database Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0907 Jet Database Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0908 Jet Database Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0909 Jet Database Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0974 Jet Database Engine Remote Code Execution Vulnerability Important No No
CVE-2019-1034 Microsoft Word Remote Code Execution Vulnerability Important No No
CVE-2019-1035 Microsoft Word Remote Code Execution Vulnerability Important No No
CVE-2019-1005 Scripting Engine Memory Corruption Vulnerability Important No No
CVE-2019-1054 Microsoft Edge Security Feature Bypass Vulnerability Important No No
CVE-2019-1019 Microsoft Windows Security Feature Bypass Vulnerability Important No No
CVE-2019-1044 Windows Secure Kernel Mode Security Feature Bypass Vulnerability Important No No
CVE-2019-0996 Azure DevOps Server Spoofing Vulnerability Important No No
CVE-2019-1040 Windows NTLM Tampering Vulnerability Important No No
CVE-2019-1031 Microsoft Office SharePoint XSS Vulnerability Important No No
CVE-2019-1032 Microsoft Office SharePoint XSS Vulnerability Important No No
CVE-2019-1033 Microsoft Office SharePoint XSS Vulnerability Important No No
CVE-2019-1036 Microsoft Office SharePoint XSS Vulnerability Important No No
CVE-2019-0948 Windows Event Viewer Information Disclosure Vulnerability Moderate No No

Start a Free Trial

Try Syxsense today and start patching your IT environment with a powerful and easy-to-use IT management toolset.

||

Not Your Usual Patch Tuesday: Rare Patch for Legacy Systems

By News, Patch Management, Patch Tuesday

Not Your Usual Patch Tuesday: May Updates

May includes a rare but urgent patch for previously unsupported versions: Windows XP, 7 and Server 2003.

Microsoft has released a security fix for several unsupported versions of Windows, including Windows XP and Windows Server 2003. If you are a user of either of those systems, you need to patch now.

The vulnerability, CVE-2019-0708, is a potentially ‘wormable’ flaw that could result in a malware attack like WannaCry. To exploit the vulnerability “an attacker would need to send a specially crafted request to the target systems Remote Desktop Service via RDP,” Microsoft officials noted.

“The Remote Desktop Protocol (RDP) itself is not vulnerable. This vulnerability is pre-authentication and requires no user interaction. In other words, the vulnerability is ‘wormable’, meaning that any future malware that exploits this vulnerability could propagate from vulnerable computer to vulnerable computer in a similar way as the WannaCry malware spread across the globe in 2017,” explains Microsoft officials in today’s Microsoft Security Response Center (MSRC) blog post.

Even though unsupported, Windows 7, XP, and Server 2003, still account for over 35% of the Microsoft-based installations. This vulnerability could potentially affect over 400 million PCs worldwide.

Desktop Windows Version Market Share Worldwide - April 2019

Additionally, Remote Desktop alone has already been recognized as an insecure method of remote connection, whether using VPN or not.

An IT solution like Syxsense will facilitate a comprehensive patching strategy as well as offer a fully-encrypted Remote Control to ensure all systems are up to date and protected.

Organizations must act now and implement a proactive approach to securing their networks. An IT solution like Syxsense will facilitate a comprehensive patching strategy to ensure all systems are up to date.

Patch Tuesday Release

Microsoft have released 79 patches today covering IE, Edge, ChakraCore, .NET Framework, Azure, Windows and Office. There are 22 rated Critical and 57 are Important. In this release there are no Moderate or Low in severity, but this is up over last month’s release of 74 updates, so will keep you even busier than April.

Publicly Known & Active Exploits: Prioritize Now

Two of the updates CVE-2019-0863 and CVE-2019-0932 are “Publicly Discovered” where CVE-2019-0863 is already reported to be used in the wild where they are able to run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with administrator privileges – you must prioritise them now.

Robert Brown, Director of Services for Verismic said, “To exploit the vulnerability, an attacker must first gain unprivileged execution on a victims operating system which given the number of Remote Code Execution vulnerabilities in this release makes this specific vulnerability your number 1 priority.”

Adobe Updates

Adobe have released a shockingly huge release this month, counting up to 84 updates for Reader and Acrobat. All updates are Critical or Important priority 2 meaning IT Admins should install these updates within the next 30 days.

Patch Tuesday Release

Verismic Recommended CVE Identity Description / Type Severity Publicly Discovered Actively Being Exploited
Yes CVE-2019-0863 Windows Error Reporting Elevation of Privilege Vulnerability Important Yes Yes
Yes CVE-2019-0932 Skype for Android Information Disclosure Vulnerability Important Yes No
Yes CVE-2019-0912 Chakra Scripting Engine Memory Corruption Vulnerability Critical No No
Yes CVE-2019-0913 Chakra Scripting Engine Memory Corruption Vulnerability Critical No No
Yes CVE-2019-0914 Chakra Scripting Engine Memory Corruption Vulnerability Critical No No
Yes CVE-2019-0915 Chakra Scripting Engine Memory Corruption Vulnerability Critical No No
Yes CVE-2019-0916 Chakra Scripting Engine Memory Corruption Vulnerability Critical No No
Yes CVE-2019-0917 Chakra Scripting Engine Memory Corruption Vulnerability Critical No No
Yes CVE-2019-0922 Chakra Scripting Engine Memory Corruption Vulnerability Critical No No
Yes CVE-2019-0924 Chakra Scripting Engine Memory Corruption Vulnerability Critical No No
Yes CVE-2019-0925 Chakra Scripting Engine Memory Corruption Vulnerability Critical No No
Yes CVE-2019-0927 Chakra Scripting Engine Memory Corruption Vulnerability Critical No No
Yes CVE-2019-0933 Chakra Scripting Engine Memory Corruption Vulnerability Critical No No
Yes CVE-2019-0937 Chakra Scripting Engine Memory Corruption Vulnerability Critical No No
Yes CVE-2019-0903 GDI+ Remote Code Execution Vulnerability Critical No No
Yes CVE-2019-0929 Internet Explorer Memory Corruption Vulnerability Critical No No
Yes CVE-2019-0940 Microsoft Browser Memory Corruption Vulnerability Critical No No
Yes CVE-2019-0926 Microsoft Edge Memory Corruption Vulnerability Critical No No
Yes CVE-2019-0953 Microsoft Word Remote Code Execution Vulnerability Critical No No
Yes CVE-2019-0708 Remote Desktop Services Remote Code Execution Vulnerability Critical No No
Yes CVE-2019-0884 Scripting Engine Memory Corruption Vulnerability Critical No No
Yes CVE-2019-0911 Scripting Engine Memory Corruption Vulnerability Critical No No
Yes CVE-2019-0918 Scripting Engine Memory Corruption Vulnerability Critical No No
Yes CVE-2019-0725 Windows DHCP Server Remote Code Execution Vulnerability Critical No No
CVE-2019-0980 .NET Core Denial of Service Vulnerability Important No No
CVE-2019-0982 .NET Core Denial of Service Vulnerability Important No No
CVE-2019-0820 .NET Framework and .NET Core Denial of Service Vulnerability Important No No
CVE-2019-0981 .Net Framework and .Net Core Denial of Service Vulnerability Important No No
CVE-2019-0864 .NET Framework Denial of Service Vulnerability Important No No
CVE-2019-1000 Azure AD Connect Elevation of Privilege Vulnerability Important No No
CVE-2019-0727 Diagnostic Hub Standard Collector, Visual Studio Standard Collector Elevation of Privilege Vulnerability Important No No
CVE-2019-0938 Microsoft Edge Elevation of Privilege Vulnerability Important No No
CVE-2019-0957 Microsoft SharePoint Elevation of Privilege Vulnerability Important No No
CVE-2019-0958 Microsoft SharePoint Elevation of Privilege Vulnerability Important No No
CVE-2019-0942 Unified Write Filter Elevation of Privilege Vulnerability Important No No
CVE-2019-0892 Win32k Elevation of Privilege Vulnerability Important No No
CVE-2019-0734 Windows Elevation of Privilege Vulnerability Important No No
CVE-2019-0936 Windows Elevation of Privilege Vulnerability Important No No
CVE-2019-0881 Windows Kernel Elevation of Privilege Vulnerability Important No No
CVE-2019-0707 Windows NDIS Elevation of Privilege Vulnerability Important No No
CVE-2019-0931 Windows Storage Service Elevation of Privilege Vulnerability Important No No
CVE-2019-0971 Azure DevOps Server and Team Foundation Server Information Disclosure Vulnerability Important No No
CVE-2019-0930 Internet Explorer Information Disclosure Vulnerability Important No No
CVE-2019-0956 Microsoft SharePoint Server Information Disclosure Vulnerability Important No No
CVE-2019-0819 Microsoft SQL Server Analysis Services Information Disclosure Vulnerability Important No No
CVE-2019-0758 Windows GDI Information Disclosure Vulnerability Important No No
CVE-2019-0882 Windows GDI Information Disclosure Vulnerability Important No No
CVE-2019-0961 Windows GDI Information Disclosure Vulnerability Important No No
CVE-2019-0886 Windows Hyper-V Information Disclosure Vulnerability Important No No
CVE-2019-0923 Chakra Scripting Engine Memory Corruption Vulnerability Important No No
CVE-2019-0889 Jet Database Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0890 Jet Database Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0891 Jet Database Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0893 Jet Database Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0894 Jet Database Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0895 Jet Database Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0896 Jet Database Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0897 Jet Database Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0898 Jet Database Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0899 Jet Database Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0900 Jet Database Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0901 Jet Database Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0902 Jet Database Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0945 Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0946 Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0947 Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0952 Microsoft SharePoint Server Remote Code Execution Vulnerability Important No No
CVE-2019-0885 Windows OLE Remote Code Execution Vulnerability Important No No
CVE-2019-0995 Internet Explorer Security Feature Bypass Vulnerability Important No No
CVE-2019-1008 Microsoft Dynamics On-Premise Security Feature Bypass Important No No
CVE-2019-0733 Windows Defender Application Control Security Feature Bypass Vulnerability Important No No
CVE-2019-0921 Internet Explorer Spoofing Vulnerability Important No No
CVE-2019-0949 Microsoft SharePoint Spoofing Vulnerability Important No No
CVE-2019-0950 Microsoft SharePoint Spoofing Vulnerability Important No No
CVE-2019-0951 Microsoft SharePoint Spoofing Vulnerability Important No No
CVE-2019-0976 NuGet Package Manager Tampering Vulnerability Important No No
CVE-2019-0872 Azure DevOps Server and Team Foundation Server Cross-site Scripting Vulnerability Important No No
CVE-2019-0979 Azure DevOps Server and Team Foundation Server Cross-site Scripting Vulnerability Important No No
CVE-2019-0963 Microsoft Office SharePoint XSS Vulnerability Important No No

Start a Free Trial

Try Syxsense today and start patching your IT environment with a powerful and easy-to-use IT management toolset.

Syxsense demo

Schedule Your Syxsense Demo

Syxsense combines IT management, patch management, and security vulnerability scanning in one powerful solution. Get started today.

Schedule My Demo
||

April Patch Tuesday: Stop Active Exploits

By News, Patch Management, Patch Tuesday

April Patch Tuesday: Stop Active Exploits

Microsoft's security release for April covers 74 vulnerabilities in a wide range of products, including two actively exploited zero-days.

Microsoft have released 74 patches today covering IE, Edge, Exchange, Windows and Office. There are 13 rated Critical and 61 are Important. In this release there are no Moderate or Low in severity but this is up over last month’s release of 64 updates, this release will keep you busy.

Prioritize Active Exploits

Two of the updates CVE-2019-0803 and CVE-2019-0859 are “Being Exploited” meaning you should  prioritise them now. Robert Brown, Director of Services for Verismic said, “You should treat these updates with the highest importance because a similar vulnerability this year in Win32k elevation caused some significant global intrusions via malware infections.”

Adobe Updates

Adobe have released 8 updates today, for Reader, Flash, Shockwave, InDesign and Dreamweaver and a few others. The update for Flash is Critical meaning IT Admins should install these updates within the next 30 days.

Some Features Updates are Now Retired

Act now to keep your environment future proofed as updates will automatically uninstall.

Today the Windows 10 feature update version 1709 (and previous) is retired on Home, Pro and Pro for Workstations editions. If you try to deploy any security updates / patches to Windows 10 which are no longer supported, those updates will uninstall the next time the PC restarts. Ask your account manager how Syxsense can help you deploy your Windows 10 Feature Updates.

We have made a few recommendations below which you should prioritize, use Syxsense to organize and deploy Windows, third-party, Mac OS, and Linux updates to keep your environment safe.

Patch Tuesday Release

Verismic Recommended ID Description Severity Publicly Disclosed Actively being Exploited
Yes CVE-2019-0803 Win32k Elevation of Privilege Vulnerability Important No Yes
Yes CVE-2019-0859 Win32k Elevation of Privilege Vulnerability Important No Yes
Yes CVE-2019-0739 Scripting Engine Memory Corruption Vulnerability Critical No No
Yes CVE-2019-0786 SMB Server Elevation of Privilege Vulnerability Critical No No
Yes CVE-2019-0791 MS XML Remote Code Execution Vulnerability Critical No No
Yes CVE-2019-0792 MS XML Remote Code Execution Vulnerability Critical No No
Yes CVE-2019-0793 MS XML Remote Code Execution Vulnerability Critical No No
Yes CVE-2019-0806 Chakra Scripting Engine Memory Corruption Vulnerability Critical No No
Yes CVE-2019-0810 Chakra Scripting Engine Memory Corruption Vulnerability Critical No No
Yes CVE-2019-0812 Chakra Scripting Engine Memory Corruption Vulnerability Critical No No
Yes CVE-2019-0829 Chakra Scripting Engine Memory Corruption Vulnerability Critical No No
Yes CVE-2019-0845 Windows IOleCvt Interface Remote Code Execution Vulnerability Critical No No
Yes CVE-2019-0853 GDI+ Remote Code Execution Vulnerability Critical No No
Yes CVE-2019-0860 Chakra Scripting Engine Memory Corruption Vulnerability Critical No No
Yes CVE-2019-0861 Chakra Scripting Engine Memory Corruption Vulnerability Critical No No
CVE-2019-0685 Win32k Elevation of Privilege Vulnerability Important No No
CVE-2019-0688 Windows TCP/IP Information Disclosure Vulnerability Important No No
CVE-2019-0730 Windows Elevation of Privilege Vulnerability Important No No
CVE-2019-0731 Windows Elevation of Privilege Vulnerability Important No No
CVE-2019-0732 Windows Security Feature Bypass Vulnerability Important No No
CVE-2019-0735 Windows CSRSS Elevation of Privilege Vulnerability Important No No
CVE-2019-0752 Scripting Engine Memory Corruption Vulnerability Important No No
CVE-2019-0753 Scripting Engine Memory Corruption Vulnerability Important No No
CVE-2019-0764 Microsoft Browsers Tampering Vulnerability Important No No
CVE-2019-0790 MS XML Remote Code Execution Vulnerability Important No No
CVE-2019-0794 VBScript Remote Code Execution Vulnerability Important No No
CVE-2019-0795 MS XML Remote Code Execution Vulnerability Important No No
CVE-2019-0796 Windows Elevation of Privilege Vulnerability Important No No
CVE-2019-0801 Office Remote Code Execution Vulnerability Important No No
CVE-2019-0802 Windows GDI Information Disclosure Vulnerability Important No No
CVE-2019-0805 Windows Elevation of Privilege Vulnerability Important No No
CVE-2019-0813 Windows Admin Center Elevation of Privilege Vulnerability Important No No
CVE-2019-0814 Win32k Information Disclosure Vulnerability Important No No
CVE-2019-0815 ASP.NET Core Denial of Service Vulnerability Important No No
CVE-2019-0817 Microsoft Exchange Spoofing Vulnerability Important No No
CVE-2019-0822 Microsoft Graphics Components Remote Code Execution Vulnerability Important No No
CVE-2019-0823 Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0824 Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0825 Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0826 Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0827 Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0828 Microsoft Excel Remote Code Execution Vulnerability Important No No
CVE-2019-0830 Microsoft Office SharePoint XSS Vulnerability Important No No
CVE-2019-0831 Microsoft Office SharePoint XSS Vulnerability Important No No
CVE-2019-0833 Microsoft Edge Information Disclosure Vulnerability Important No No
CVE-2019-0835 Microsoft Scripting Engine Information Disclosure Vulnerability Important No No
CVE-2019-0836 Windows Elevation of Privilege Vulnerability Important No No
CVE-2019-0837 DirectX Information Disclosure Vulnerability Important No No
CVE-2019-0838 Windows Information Disclosure Vulnerability Important No No
CVE-2019-0839 Windows Information Disclosure Vulnerability Important No No
CVE-2019-0840 Windows Kernel Information Disclosure Vulnerability Important No No
CVE-2019-0841 Windows Elevation of Privilege Vulnerability Important No No
CVE-2019-0842 Windows VBScript Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0844 Windows Kernel Information Disclosure Vulnerability Important No No
CVE-2019-0846 Jet Database Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0847 Jet Database Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0848 Win32k Information Disclosure Vulnerability Important No No
CVE-2019-0849 Windows GDI Information Disclosure Vulnerability Important No No
CVE-2019-0851 Jet Database Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0856 Windows Remote Code Execution Vulnerability Important No No
CVE-2019-0857 Team Foundation Server Spoofing Vulnerability Important No No
CVE-2019-0858 Microsoft Exchange Spoofing Vulnerability Important No No
CVE-2019-0862 Windows VBScript Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0866 Team Foundation Server Cross-site Scripting Vulnerability Important No No
CVE-2019-0867 Team Foundation Server Cross-site Scripting Vulnerability Important No No
CVE-2019-0868 Team Foundation Server Cross-site Scripting Vulnerability Important No No
CVE-2019-0869 Team Foundation Server HTML Injection Vulnerability Important No No
CVE-2019-0870 Team Foundation Server Cross-site Scripting Vulnerability Important No No
CVE-2019-0871 Team Foundation Server Cross-site Scripting Vulnerability Important No No
CVE-2019-0874 Team Foundation Server Cross-site Scripting Vulnerability Important No No
CVE-2019-0875 Azure DevOps Server Elevation of Privilege Vulnerability Important No No
CVE-2019-0876 Open Enclave SDK Information Disclosure Vulnerability Important No No
CVE-2019-0877 Jet Database Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0879 Jet Database Engine Remote Code Execution Vulnerability Important No No

Start a Free Trial

Try Syxsense today and start patching your IT environment with a powerful and easy-to-use IT management toolset.

Syxsense demo

Schedule Your Syxsense Demo

Syxsense combines IT management, patch management, and security vulnerability scanning in one powerful solution. Get started today.

Schedule My Demo
||

March Patch Tuesday: Eliminate the Exploits

By News, Patch Management, Patch Tuesday

March Patch Tuesday: Eliminate the Exploits

It's the second Tuesday of March, which means it's time for another round of Patch Tuesday security updates.

Microsoft has released 64 patches today covering IE, Edge, Exchange, Windows and Office. There are 17 rated Critical, 45 rated Important, 1 is rated Moderate and is rated Low in severity—this is much less than last month’s release of over 80 updates, however there are still some surprises in this release to keep you busy.

Prioritize Now: Public Announced and Current Exploits

Four of the updates CVE-2019-0683, CVE-2019-0754, CVE-2019-0757 and CVE-2019-0809 are marked as “Publicly Disclosed” meaning there is an increased risk of attack in the very near future, and two updates CVE-2019-0797 & CVE-2019-0808 are marked as “Being Exploited” meaning you should prioritize them now.

Robert Brown, Director of Services for Verismic said, “You should treat these 6 updates with the highest importance, and you should especially treat CVE-2019-0797 & CVE-2019-0808 as a Zero Day because active exploits means actual attempts on your networks by those who wish to expose your data.”

Adobe Patches Flash, Photoshop and Digital Editions

Adobe has given a slight reprieve to IT managers this month by releasing only 3 updates: one for Flash, Photoshop and Digital Editions. Although these updates carry a Critical severity, they are ranked by Adobe with a Priority of 3 meaning administrators should install these updates at their discretion.

Features Updates Due for Retirement

On April 9, the Windows 10 feature update version 1709 will be due for retirement on Home, Pro and Pro for Workstations editions. If you are still using Enterprise or Education editions, you have another year to plan your upgrade.

Use Syxsense to organize and deploy Windows, third-party, Mac OS and Linux updates to keep your environment safe. Our clients love having control over when and where the scanning and deployment of updates takes place, providing peace of mind to any IT department.

Patch Tuesday Release

ID Description Severity Publicly Announced Actively Exploited Recommended
CVE-2019-0797 Win32k Elevation of Privilege Vulnerability Important No Yes Yes
CVE-2019-0808 Win32k Elevation of Privilege Vulnerability Important No Yes Yes
CVE-2019-0683 Active Directory Elevation of Privilege Vulnerability Important Yes No Yes
CVE-2019-0754 Windows Denial of Service Vulnerability Important Yes No Yes
CVE-2019-0757 NuGet Package Manager Tampering Vulnerability Important Yes No Yes
CVE-2019-0809 Visual Studio Remote Code Execution Vulnerability Important Yes No Yes
CVE-2019-0592 Chakra Scripting Engine Memory Corruption Vulnerability Critical No No Yes
CVE-2019-0603 Windows Deployment Services TFTP Server Remote Code Execution Vulnerability Critical No No Yes
CVE-2019-0609 Scripting Engine Memory Corruption Vulnerability Critical No No Yes
CVE-2019-0639 Scripting Engine Memory Corruption Vulnerability Critical No No Yes
CVE-2019-0666 Windows VBScript Engine Remote Code Execution Vulnerability Critical No No Yes
CVE-2019-0667 Windows VBScript Engine Remote Code Execution Vulnerability Critical No No Yes
CVE-2019-0680 Scripting Engine Memory Corruption Vulnerability Critical No No Yes
CVE-2019-0697 Windows DHCP Client Remote Code Execution Vulnerability Critical No No Yes
CVE-2019-0698 Windows DHCP Client Remote Code Execution Vulnerability Critical No No Yes
CVE-2019-0726 Windows DHCP Client Remote Code Execution Vulnerability Critical No No Yes
CVE-2019-0756 MS XML Remote Code Execution Vulnerability Critical No No Yes
CVE-2019-0763 Internet Explorer Memory Corruption Vulnerability Critical No No Yes
CVE-2019-0769 Scripting Engine Memory Corruption Vulnerability Critical No No Yes
CVE-2019-0770 Scripting Engine Memory Corruption Vulnerability Critical No No Yes
CVE-2019-0771 Scripting Engine Memory Corruption Vulnerability Critical No No Yes
CVE-2019-0773 Scripting Engine Memory Corruption Vulnerability Critical No No Yes
CVE-2019-0784 Windows ActiveX Remote Code Execution Vulnerability Critical No No Yes
CVE-2019-0612 Microsoft Edge Security Feature Bypass Vulnerability Important No No
CVE-2019-0614 Windows GDI Information Disclosure Vulnerability Important No No
CVE-2019-0617 Jet Database Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0665 Windows VBScript Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0678 Microsoft Edge Elevation of Privilege Vulnerability Important No No
CVE-2019-0682 Windows Subsystem for Linux Elevation of Privilege Vulnerability Important No No
CVE-2019-0689 Windows Subsystem for Linux Elevation of Privilege Vulnerability Important No No
CVE-2019-0690 Windows Hyper-V Denial of Service Vulnerability Important No No
CVE-2019-0692 Windows Subsystem for Linux Elevation of Privilege Vulnerability Important No No
CVE-2019-0693 Windows Subsystem for Linux Elevation of Privilege Vulnerability Important No No
CVE-2019-0694 Windows Subsystem for Linux Elevation of Privilege Vulnerability Important No No
CVE-2019-0695 Hyper-V Denial of Service Vulnerability Important No No
CVE-2019-0696 Windows Kernel Elevation of Privilege Vulnerability Important No No
CVE-2019-0701 Hyper-V Denial of Service Vulnerability Important No No
CVE-2019-0702 Windows Kernel Information Disclosure Vulnerability Important No No
CVE-2019-0703 Windows SMB Information Disclosure Vulnerability Important No No
CVE-2019-0704 Windows SMB Information Disclosure Vulnerability Important No No
CVE-2019-0748 Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0755 Windows Kernel Information Disclosure Vulnerability Important No No
CVE-2019-0759 Windows Print Spooler Information Disclosure Vulnerability Important No No
CVE-2019-0761 Windows Security Zone Bypass Vulnerability Important No No
CVE-2019-0762 Microsoft Browsers Security Feature Bypass Vulnerability Important No No
CVE-2019-0765 Comctl32 Remote Code Execution Vulnerability Important No No
CVE-2019-0766 Microsoft Windows Elevation of Privilege Vulnerability Important No No
CVE-2019-0767 Windows Kernel Information Disclosure Vulnerability Important No No
CVE-2019-0768 Internet Explorer Security Feature Bypass Vulnerability Important No No
CVE-2019-0772 Windows VBScript Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0774 Windows GDI Information Disclosure Vulnerability Important No No
CVE-2019-0775 Windows Kernel Information Disclosure Vulnerability Important No No
CVE-2019-0776 Win32k Information Disclosure Vulnerability Important No No
CVE-2019-0778 Microsoft Office SharePoint XSS Vulnerability Important No No
CVE-2019-0779 Microsoft Edge Memory Corruption Vulnerability Important No No
CVE-2019-0782 Windows Kernel Information Disclosure Vulnerability Important No No
CVE-2019-0783 Scripting Engine Memory Corruption Vulnerability Important No No
CVE-2019-0798 Skype for Business and Lync Spoofing Vulnerability Important No No
CVE-2019-0821 Windows SMB Information Disclosure Vulnerability Important No No
CVE-2019-0611 Chakra Scripting Engine Memory Corruption Vulnerability Important No No
CVE-2019-0746 Chakra Scripting Engine Memory Corruption Vulnerability Important No No
CVE-2019-0780 Microsoft Browser Memory Corruption Vulnerability Important No No
CVE-2019-0816 Azure SSH Keypairs Security Feature Bypass Vulnerability Moderate No No
CVE-2019-0777 Team Foundation Server Cross-site Scripting Vulnerability Low No No

Start a Free Trial

Try Syxsense today and start patching your IT environment with a powerful and easy-to-use IT management toolset.

Syxsense demo

Schedule Your Syxsense Demo

Syxsense combines IT management, patch management, and security vulnerability scanning in one powerful solution. Get started today.

Schedule My Demo
|||

Adobe Patches Critical Flaw Twice in One Week

By News, Patch Management

Adobe Patches Critical Flaw Twice in One Week

In a matter of days, Adobe has patched a critical information disclosure flaw in Reader twice.

Adobe has been tripping over its own patches this week.

After its original fix failed, Adobe has issued yet another patch for a critical zero-day vulnerability in its Acrobat Reader. The previous vulnerability (CVE-2019-7089) was resolved last week in Adobe’s February 12 patch release. It was described as a sensitive data leak issue which can lead to information disclosure when exploited.

Cure53 researcher, Alex Inführ, originally reported the zero-day vulnerability in Adobe Reader. The exploit could permit attackers to steal victims’ hashed password values, known as “NTLM hashes.”

Despite an embarrassing few days, Adobe has issued a second patch (CVE-2019-7815) that will hopefully resolve the issue. This should serve as a reminder for the importance of third-party patching—ensure you never miss an update with Syxsense.

Start a Free Trial

Try Syxsense today and start patching your IT environment with a powerful and easy-to-use IT management toolset.
Syxsense demo

Schedule Your Syxsense Demo

Syxsense combines IT management, patch management, and security vulnerability scanning in one powerful solution. Get started today.

Schedule My Demo
||||

February Patch Tuesday: Disable Windows Update

By News, Patch Management, Patch Tuesday

February Patch Tuesday: Disable Windows Update

It's the second Tuesday of February, which means it's time for another round of Patch Tuesday security updates from Microsoft.

Microsoft has released almost 80 security patches today covering IE, Edge, Exchange, Windows, .NET Framework and Office. There are only 20 rated Critical, 54 rated Important, and 3 are rated Moderate in severity.

Four of the updates released CVE-2019-0636, CVE-2019-0686, CVE-2019-0646 and CVE-2019-0647 are marked as “Publicly Disclosed” meaning there is an increased risk of attack in the near future. Although they are marked Important, we would highly recommend these updates be prioritized this month.

Why should you disable Windows Update?

Many of our customers are concerned that updates released by Microsoft cause significant user disruption, and are simply unable to keep up with the constant fire fighting bad patches give an IT department.

The first reaction is not to patch. This places your environment and users’ identity at risk of exposure, and risk a total network breach. Leaving Windows Update enabled in its default setting downloads and installs all updates released by Microsoft on the same day they are released, leaving your IT department no time to test.

Our clients like the way Syxsense provides the control over when and where the scanning and deployment of updates takes place, providing much relieved stress to any IT department. Ask us how Maintenance Windows can help schedule any patch deployment over high dispersed environments.

Adobe Releases Over 70 Updates

Acrobat and Reader from version 2019.010.20069 and earlier for both Windows and Mac OS are affected. All updates carry a Priority Rating of 2 meaning there is an elevated risk of exploit although no active exploits are known to exist in the wild.

Robert Brown, Director of Services said, “Adobe use their Priority Rating to illustrate how quickly users should update their systems, in this case they recommend within 30 days. Users using Mac OS who usually update their systems manually can truly benefit from the remote patching capability of Syxsense which enables automation over a typical otherwise manual method.”

Of the 71 updates released today, 43 are rating Critical. If exploited, this would allow malicious native-code to execute, potentially without a user being aware.

Is it time to replace IE?

Over the past several months there is an increasing amount of “Actively Exploited” updates being fixed by Microsoft. CVE-2019-0676 is no exception, and as it involved Internet Explorer which is still highly used we would recommend this update be one of your top priorities.

If you wish to replace IE with another browser, Syxsense can deploy the software throughout your environment, and better still your new browser can be kept up date using the Patch Manager solution. Replace your IE browser before an exploit ruins your Valentine’s Day.

Start a Free Trial

Try Syxsense today and start patching your IT environment with a powerful and easy-to-use IT management toolset.

Patch Tuesday Release

CVE ID Patch Description Severity Publicly Disclosed Active Exploited Recommended
CVE-2019-0676 Internet Explorer Information Disclosure Vulnerability Important No Yes Yes
CVE-2019-0636 Windows Information Disclosure Vulnerability Important Yes No Yes
CVE-2019-0686 Microsoft Exchange Server Elevation of Privilege Vulnerability Important Yes No Yes
CVE-2019-0646 Team Foundation Server Cross-site Scripting Vulnerability Important Yes No Yes
CVE-2019-0647 Team Foundation Server Information Disclosure Vulnerability Important Yes No Yes
CVE-2019-0590 Scripting Engine Memory Corruption Vulnerability Critical No No Yes
CVE-2019-0591 Scripting Engine Memory Corruption Vulnerability Critical No No Yes
CVE-2019-0593 Scripting Engine Memory Corruption Vulnerability Critical No No Yes
CVE-2019-0594 Microsoft SharePoint Remote Code Execution Vulnerability Critical No No Yes
CVE-2019-0604 Microsoft SharePoint Remote Code Execution Vulnerability Critical No No Yes
CVE-2019-0605 Scripting Engine Memory Corruption Vulnerability Critical No No Yes
CVE-2019-0606 Internet Explorer Memory Corruption Vulnerability Critical No No Yes
CVE-2019-0607 Scripting Engine Memory Corruption Vulnerability Critical No No Yes
CVE-2019-0618 GDI+ Remote Code Execution Vulnerability Critical No No Yes
CVE-2019-0626 Windows DHCP Server Remote Code Execution Vulnerability Critical No No Yes
CVE-2019-0634 Microsoft Edge Memory Corruption Vulnerability Critical No No Yes
CVE-2019-0640 Scripting Engine Memory Corruption Vulnerability Critical No No Yes
CVE-2019-0642 Scripting Engine Memory Corruption Vulnerability Critical No No Yes
CVE-2019-0644 Scripting Engine Memory Corruption Vulnerability Critical No No Yes
CVE-2019-0645 Microsoft Edge Memory Corruption Vulnerability Critical No No Yes
CVE-2019-0650 Microsoft Edge Memory Corruption Vulnerability Critical No No Yes
CVE-2019-0651 Scripting Engine Memory Corruption Vulnerability Critical No No Yes
CVE-2019-0652 Scripting Engine Memory Corruption Vulnerability Critical No No Yes
CVE-2019-0655 Scripting Engine Memory Corruption Vulnerability Critical No No Yes
CVE-2019-0662 GDI+ Remote Code Execution Vulnerability Critical No No Yes
CVE-2019-0540 Microsoft Office Security Feature Bypass Vulnerability Important No No
CVE-2019-0595 Jet Database Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0596 Jet Database Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0597 Jet Database Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0598 Jet Database Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0599 Jet Database Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0600 HID Information Disclosure Vulnerability Important No No
CVE-2019-0601 HID Information Disclosure Vulnerability Important No No
CVE-2019-0602 Windows GDI Information Disclosure Vulnerability Important No No
CVE-2019-0610 Scripting Engine Memory Corruption Vulnerability Important No No
CVE-2019-0613 .NET Framework and Visual Studio Remote Code Execution Vulnerability Important No No
CVE-2019-0615 Windows GDI Information Disclosure Vulnerability Important No No
CVE-2019-0616 Windows GDI Information Disclosure Vulnerability Important No No
CVE-2019-0619 Windows GDI Information Disclosure Vulnerability Important No No
CVE-2019-0621 Windows Kernel Information Disclosure Vulnerability Important No No
CVE-2019-0623 Win32k Elevation of Privilege Vulnerability Important No No
CVE-2019-0625 Jet Database Engine Remote Code Execution Vulnerability Important No No
CVE-2019-0627 Windows Security Feature Bypass Vulnerability Important No No
CVE-2019-0628 Win32k Information Disclosure Vulnerability Important No No
CVE-2019-0630 Windows SMB Remote Code Execution Vulnerability Important No No
CVE-2019-0631 Windows Security Feature Bypass Vulnerability Important No No
CVE-2019-0632 Windows Security Feature Bypass Vulnerability Important No No
CVE-2019-0633 Windows SMB Remote Code Execution Vulnerability Important No No
CVE-2019-0635 Windows Hyper-V Information Disclosure Vulnerability Important No No
CVE-2019-0637 Windows Defender Firewall Security Feature Bypass Vulnerability Important No No
CVE-2019-0648 Scripting Engine Information Disclosure Vulnerability Important No No
CVE-2019-0649 Scripting Engine Elevation of Privileged Vulnerability Important No No
CVE-2019-0654 Microsoft Browser Spoofing Vulnerability Important No No
CVE-2019-0656 Windows Kernel Elevation of Privilege Vulnerability Important No No
CVE-2019-0657 .NET Framework and Visual Studio Spoofing Vulnerability Important No No
CVE-2019-0658 Scripting Engine Information Disclosure Vulnerability Important No No
CVE-2019-0659 Windows Storage Service Elevation of Privilege Vulnerability Important No No
CVE-2019-0660 Windows GDI Information Disclosure Vulnerability Important No No
CVE-2019-0661 Windows Kernel Information Disclosure Vulnerability Important No No
CVE-2019-0664 Windows GDI Information Disclosure Vulnerability Important No No
CVE-2019-0668 Microsoft SharePoint Elevation of Privilege Vulnerability Important No No
CVE-2019-0669 Microsoft Excel Information Disclosure Vulnerability Important No No
CVE-2019-0724 Microsoft Exchange Server Elevation of Privilege Vulnerability Important No No
CVE-2019-0728 Visual Studio Code Remote Code Execution Vulnerability Important No No
CVE-2019-0641 Microsoft Edge Security Feature Bypass Vulnerability Moderate No No
CVE-2019-0643 Microsoft Edge Information Disclosure Vulnerability Moderate No No
CVE-2019-0670 Microsoft SharePoint Spoofing Vulnerability Moderate No No
Syxsense demo

Schedule Your Syxsense Demo

Syxsense combines IT management, patch management, and security vulnerability scanning in one powerful solution. Get started today.

Schedule My Demo

January Third-Party Security Updates

By News, Patch Management, Uncategorized

Latest Third-Party Updates

This month there are several notable updates with CVSS ratings. Apple has released critical fixes for two of their OS platforms. Adobe and Foxit both have patches with high ratings. Prioritize these updates when securing your environment.

Still using WSUS?

If so, how are you deploying third-party security updates?
It’s time to switch to an IT management solution that can deploy any security updates required. Don’t rely on an incomplete tool that can only deploy windows updates. Syxsense can deploy a wide-range of updates, including Windows, Mac, and Linux software.

Third-Party Updates

Vendor Category Patch Version and Release Notes: CVSS Score and Rating
Adobe Multi-purpose software Flash Player, ActiveX, and AIR: v32.0.0.114Acrobat and Reader DC: v19.010.20069 N/A7.8 and High
Apple Operating Systems macOS: v10.14.3macOS High Sierra: v10.13.6

iTunes: v12.9.3.3

9 and Critical9 and Critical

N/A

Don Ho Text and Source Code Editor Notepad: v7.6.3 N/A
Evernote Organization App Evernote: v6.17.6.8292 N/A
FileZilla FTP application FileZilla: v3.40.0 N/A
Foxit Corporation PDF software FoxitReader: v9.4.0 6.3 and High
Google Browser Google Earth Pro: v7.3.2.5495 N/A
KeePass Open-source password manager KeePass: v2.41 N/A
Mozilla Browser and Email Application Firefox: v64.0.2 N/A
Opera Web Browser Opera: v58.0.3135.47 N/A
Oracle Computer Programing Language Java: v8u202 N/A
Peter Pawlowski Audio Player Foobar2000: v1.4.2 N/A
RealVNC Remote Access Software RealVNC Viewer: v6.19.1 N/A
WinSCP Web Client WinSCP: v5.13.7 N/A
Wireshark Open-source packet analyzer Wireshark: v2.6.6 N/A
Syxsense demo

Schedule Your Syxsense Demo

Syxsense combines IT management, patch management, and security vulnerability scanning in one powerful solution. Get started today.

Schedule My Demo