Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 124 vulnerabilities that were fixed in 9 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Microsoft has released 9 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
Affected Versions:
Windows 10, version 2004,Windows 10, version 1903 and 1909,Windows 10, version 1809 and Windows Server 2019,Windows 10, version 1803,Windows 10, version 1709,Windows 10, version 1703,Windows 10, version 1607 and Windows Server 2016,Windows 10 (initial version released July 2015),Windows 8.1, Windows RT 8.1 and Windows Server 2012 R2,Windows Server 2012 with Adobe Flash Player version prior to N/A.
QID Detection Logic:
This authenticated QID will flag if file version of %windir%\System32\Macromed\Flash\Flash.ocx is less than 32.0.0.387.
An attacker could exploit this vulnerability to compromise Confidentiality, Integrity and/or Availability.
Workaround:
1. Prevent Adobe Flash Player from running You can disable attempts to instantiate Adobe Flash Player in Internet Explorer and other applications that honor the kill bit feature, such as Office 2007 and Office 2010, by setting the kill bit for the control in the registry.
2. Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{D27CDB6E-AE6D-11CF-96B8-444553540000}]
"Compatibility Flags"=dword:00000400
3. [HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{D27CDB6E-AE6D-11CF-96B8-444553540000}]
"Compatibility Flags"=dword:00000400
Double-click the .reg file to apply it to an individual system.
You can also apply this workaround across domains by using Group Policy. For more information about Group Policy, see the TechNet article, Group Policy collection.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
ADV200010
The KB Articles associated with the update:
KB4561602
KB4561643
KB4557957
KB4560960
KB4561649
KB4561608
KB4561612
KB4561666
KB4561603
KB4561670
KB4561621
KB4561616
This QID checks for the file version of Mshtml.dll
The following versions of Mshtml.dll with their corresponding KBs are verified:
KB4561602 - 11.0.16299.1932
KB4561643 - 11.0.9600.19724
KB4557957 - 11.0.19041.329
KB4560960 - 11.0.18362.900
KB4561649 - 11.0.10240.18608
KB4561608 - 11.0.17763.1282
KB4561612 - 10.0.9200.22975 , 11.0.9600.19724
KB4561666 - 11.0.9600.19724
KB4561603 - 11.0.9600.19724 , 9.0.8112.21452
KB4561670 - 9.0.8112.21452
KB4561621 - 11.0.17134.1550
KB4561616 - 11.0.14393.3750
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft Security Update Guide Windows
This security update contains the following KBs:
KB4484402
KB4484405
KB4484414
KB4484400
KB4484391
KB4484409
QID Detection Logic:
This authenticated QID checks the file versions from above Microsoft KB article with the versions on affected office system.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft SharePoint Foundation and SharePoint Server June 2020
This security update contains the following KBs:
KB4484403
KB4484415
KB4484410
KB4484342
KB4484396
KB4484373
KB4484378
KB4484351
KB4484380
KB4484361
KB4484369
KB4484399
KB4484387
QID Detection Logic:
This authenticated QID checks the file versions from above Microsoft KB article with the versions on affected office system.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft Office and Microsoft Office Services and Web Apps Security Update JUNE 2020
Microsoft has released Servicing Stack security updates for Windows 2008, Windows 7, Windows 2008 R2.
QID Detection Logic (Authenticated):
This authenticated QID will check for file version of CbsCore.dll
Patches:
The following are links for downloading patches to fix these vulnerabilities:
ADV990001
The KB Articles associated with the update:
KB4557957
KB4560960
KB4561602
KB4561608
KB4561616
KB4561621
KB4561649
QID Detection Logic:Authenticated
This QID checks for the file version of edgehtml.dll
Please refer to the CVE-2020-1073 for more information pertaining to these vulnerabilities.
Please refer to the CVE-2020-1195 for more information pertaining to these vulnerabilities.
Please refer to the CVE-2020-1219 for more information pertaining to these vulnerabilities.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2020-1073
CVE-2020-1195
CVE-2020-1219
CVE-2020-1242
The KB Articles associated with the update:
KB4561602
KB4561670
KB4561674
KB4561643
KB4561645
KB4560960
KB4561673
KB4561608
KB4561612
KB4561666
KB4561669
KB4561649
KB4561621
KB4561616
This QID checks for the file version of ntoskrnl.exe
The following versions of ntoskrnl.exe with their corresponding KBs are verified:
KB4561602 - 10.0.16299.1932
KB4561670 - 6.0.6003.20851
KB4561674 - 6.2.9200.23060
KB4561643 - 6.1.7601.24556
KB4561645 - 6.0.6003.20851
KB4560960 - 10.0.18362.900
KB4561673 - 6.3.9600.19724
KB4561608 - 10.0.17763.1282
KB4561612 - 6.2.9200.23060
KB4561666 - 6.3.9600.19724
KB4561669 - 6.1.7601.24556
KB4561649 - 10.0.10240.18608
KB4561621 - 10.0.17134.1550
KB4561616 - 10.0.14393.3750
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft Security Update Guide Windows
Affected Software:
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
Microsoft Visual Studio 2019 version 16.4 (includes 16.0 - 16.3)
Microsoft Visual Studio 2019 version 16.6 (includes 16.0 - 16.5)
Microsoft Visual Studio 2019 version 16.0
Microsoft Visual Studio 2015 Update 3
QID Detection Logic:Authenticated
This QID detects vulnerable versions of Microsoft Visual Studio by checking file version of devenv.exe.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2020-1202
CVE-2020-1203
CVE-2020-1257
CVE-2020-1278
CVE-2020-1293
Affected Software:
Windows 10 Version 1903, Windows 10 Version 1909, Windows 10 Version 2004 and Windows Server, version 1903/1909/2004 (Server Core installation)
QID Detection Logic (Authenticated):
For SMB client side, this QID checks file version of "mrxsmb.sys"
For SMB Server side, this QID checks if SMB and SMB Compression are enabled as well as file version of "srvnet.sys".
Note: the file "srv2.sys" is not updated by the patch during our observation , this is why we are checking "srvnet.sys".
Workaround:
Disable SMBv3 compression
You can disable compression to block unauthenticated attackers from exploiting the vulnerability against an SMBv3 Server with the PowerShell command below.
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters" DisableCompression -Type DWORD -Value 1 -Force
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2020-1206 Windows(SMBv3)
These new vulnerability checks are included in Qualys vulnerability signature 2.4.911-4. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
To perform a selective vulnerability scan, configure a scan profile to use the following options:
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Platforms and Platform Identification
For more information, customers may contact Qualys Technical Support.
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.