Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 47 vulnerabilities that were fixed in 8 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Microsoft has released 8 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
The KB Articles associated with the update:
KB4534283
KB4534251
KB4534303
KB4534293
KB4534273
KB4534276
KB4528760
KB4534306
KB4534271
KB4534310
KB4534297
QID Detection Logic:Authenticated
This QID checks for the file version of Mshtml.dll
The following versions with their corresponding KBs are verified:
KB4534283 - 10.0.9200.22950
KB4534251 - 9.0.8112.21402,10.0.9200.22949,11.0.9600.19597
KB4534303 - 9.0.8112.21402
KB4534293 - 11.0.17134.1130
KB4534273 - 11.0.17763.831
KB4534276 - 11.0.16299.1565
KB4528760 - 11.0.18362.592
KB4534306 - 11.0.10240.18452
KB4534271 - 11.0.14393.3383
KB4534310 - 11.0.9600.19597
KB4534297 - 11.0.9600.19597
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2020-0640
This security update contains the following KBs:
KB4484217
KB4484243
KB4484234
KB4484223
KB4484221
KB4484236
KB4484227
QID Detection Logic:
This authenticated QID checks the file versions from above Microsoft KB article with the versions on affected office system.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft Office and Microsoft Office Services and Web Apps Security Update January 2020
The security update addresses the vulnerability by ensuring that Windows CryptoAPI completely validates ECC certificates.
The KB Articles associated with the update:
KB4528760
KB4534271
KB4534273
KB4534276
KB4534293
KB4534306
QID Detection Logic (Authenticated):
The following versions of "crypt32.dll" with their corresponding KBs are verified:
KB4528760 - 10.0.18362.592
KB4534271 - 10.0.14393.3442
KB4534273 - 10.0.17763.973
KB4534276 - 10.0.16299.1622
KB4534293 - 10.0.17134.1246
KB4534306 - 10.0.10240.18452
A successful exploit could also allow the attacker to conduct man-in-the-middle attacks and decrypt confidential information on user connections to the affected software.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft Security Update Guide Windows(CryptoAPI)
The KB Articles associated with the update:
KB4528760
KB4534271
KB4534273
KB4534276
KB4534283
KB4534288
KB4534293
KB4534297
KB4534303
KB4534306
KB4534309
KB4534310
KB4534312
KB4534314
QID Detection Logic (Authenticated):
This QID checks for the file version of "ntoskrnl.exe". For KB4534309, KB4534297, KB4534288 and KB4534283, This QID checks file version of "User32.dll"
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft Security Update Guide
Microsoft has released Servicing Stack security updates for Windows 2008, Windows 7, Windows 2008 R2, Windows 10 1903, and Windows 10 1909.
QID Detection Logic (Authenticated):
This authenticated QID will check for file version of CbsCore.dll
Patches:
The following are links for downloading patches to fix these vulnerabilities:
ADV990001
KB4532933,KB4532935,KB4532936,KB4537572,KB4534293,KB4534306,KB4534976,KB4534977,KB4534978,KB4534979,KB4535101,KB4535102,KB4535103,KB4535104,KB4535105,KB4532947 kbs are covered.
This security update is rated Critical for supported versions of Microsoft .NET Framework.
QID Detection Logic (Authenticated):
- Checks for vulnerable version of system.core.dll, system.printing.dll files
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2020-0605
CVE-2020-0606
CVE-2020-0646
Affected Versions:
ASP.NET Core 2.1 prior to 2.1.15.
ASP.NET Core 3.0 prior to 3.0.1.
ASP.NET Core 3.1 prior to 3.1.1.
QID Detection Logic (Authenticated):
This QID checks for the vulnerable version of Microsoft.AspNetCore.App and Microsoft.AspNetCore.All
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2020-0602
CVE-2020-0603
A remote code execution vulnerability exists in .NET software when the software fails to check the source markup of a file.
Affected versions
.NET Core 3.0 prior to 3.0.2
.NET Core 3.1 prior to 3.1.1
Qid detection logic:Authenticated
The qid checks for vulnerable dotnet.dll versions on windows and checks for vulnerable .net core versions.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2020-0605
CVE-2020-0606
These new vulnerability checks are included in Qualys vulnerability signature 2.4.791-3. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
To perform a selective vulnerability scan, configure a scan profile to use the following options:
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Platforms and Platform Identification
For more information, customers may contact Qualys Technical Support.
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.