Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Vulnerabilities
  • VERT Threat Alert: October 2020 Patch Tuesday Analysis
  • Vulnerabilities

VERT Threat Alert: October 2020 Patch Tuesday Analysis

5 years ago Tyler Reguly
VERT Threat Alert: October 2020 Patch Tuesday Analysis

Today’s VERT Alert addresses Microsoft’s October 2020 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-909 on Wednesday, October 14th.

In-The-Wild & Disclosed CVEs

CVE-2020-16938

This CVE describes an information disclosure in the Windows kernel that could allow a local attacker to disclose information. Specifically, the vulnerability would allow read access to kernel space memory from a user mode process.

Microsoft has rated this as a 2 (Exploitation Less Likely) on the latest software release on the Exploitability Index.

CVE-2020-16885

A vulnerability exists in the Windows Storage VSP Driver that would allow a local attacker with the ability to execute code to elevate their privileges via a flaw in the driver’s handling of file operations.

Microsoft has rated this as a 2 (Exploitation Less Likely) on the latest software release on the Exploitability Index.

CVE-2020-16901

This CVE describes an information disclosure in the Windows kernel that could allow a local attacker to disclose information. Specifically, the vulnerability would allow read access to kernel space memory from a user mode process.

Microsoft has rated this as a 2 (Exploitation Less Likely) on the latest software release on the Exploitability Index.

CVE-2020-16908

A flaw in Windows Setup’s handling of directories could allow an authenticated attacker to execute code with SYSTEM privileges. There are no patches for this vulnerability as it only exists within the software that Microsoft releases to upgrade a system. According to Microsoft all feature update bundles have been refreshed with patched binaries and the flaw no longer exists.

Microsoft has rated this as a 2 (Exploitation Less Likely) on the latest software release on the Exploitability Index.

CVE-2020-16909

A vulnerability in Windows Error Reporting could allow a local attacker to gain elevated levels of access to sensitive information and system functionality via a flaw in the Windows Error Reporting’s handling and execution of files.

Microsoft has rated this as a 2 (Exploitation Less Likely) on the latest software release on the Exploitability Index.

CVE-2020-16937

A vulnerability in the .NET Framework could allow an attacker to read memory due to an error in how the .NET Framework handles objects in memory. More specifically, an attacker could view memory layout allowing them to predict memory addressing.

Microsoft has rated this as a 2 (Exploitation Less Likely) on the latest software release on the Exploitability Index.

CVE Breakdown by Tag

While historical Microsoft Security Bulletin groupings are gone, Microsoft vulnerabilities are tagged with an identifier. This list provides a breakdown of the CVEs on a per tag basis.

Tag CVE Count CVEs
Microsoft Windows Codecs Library 2 CVE-2020-16967, CVE-2020-16968
Microsoft Dynamics 3 CVE-2020-16943, CVE-2020-16956, CVE-2020-16978
Windows Hyper-V 3 CVE-2020-16891, CVE-2020-16894, CVE-2020-1243
Group Policy 1 CVE-2020-16939
Microsoft NTFS 1 CVE-2020-16938
Windows Error Reporting 1 CVE-2020-16905
Windows RDP 3 CVE-2020-16863, CVE-2020-16896, CVE-2020-16927
.NET Framework 1 CVE-2020-16937
Microsoft Graphics Component 4 CVE-2020-16923, CVE-2020-1167, CVE-2020-16911, CVE-2020-16914
Windows COM 1 CVE-2020-16916
PowerShellGet 1 CVE-2020-16886
Azure 2 CVE-2020-16904, CVE-2020-16995
Windows Installer 1 CVE-2020-16902
Visual Studio 1 CVE-2020-16977
Windows Kernel 5 CVE-2020-16889, CVE-2020-16892, CVE-2020-1047, CVE-2020-16910, CVE-2020-16913
Windows Secure Kernel Mode 1 CVE-2020-16890
Microsoft Exchange Server 1 CVE-2020-16969
Microsoft Office 14 CVE-2020-16918, CVE-2020-16928, CVE-2020-16929, CVE-2020-16930, CVE-2020-16931, CVE-2020-16932, CVE-2020-16933, CVE-2020-16934, CVE-2020-16954, CVE-2020-17003, CVE-2020-16947, CVE-2020-16949, CVE-2020-16955, CVE-2020-16957
Microsoft Windows 30 CVE-2020-16876, CVE-2020-16877, CVE-2020-16895, CVE-2020-16897, CVE-2020-16919, CVE-2020-16920, CVE-2020-16921, CVE-2020-16922, CVE-2020-16924, CVE-2020-16935, CVE-2020-16976, CVE-2020-0764, CVE-2020-1080, CVE-2020-16885, CVE-2020-16887, CVE-2020-16898, CVE-2020-16899, CVE-2020-16900, CVE-2020-16901, CVE-2020-16907, CVE-2020-16908, CVE-2020-16909, CVE-2020-16912, CVE-2020-16936, CVE-2020-16940, CVE-2020-16972, CVE-2020-16973, CVE-2020-16974, CVE-2020-16975, CVE-2020-16980
Microsoft Office SharePoint 10 CVE-2020-16941, CVE-2020-16942, CVE-2020-16948, CVE-2020-16953, CVE-2020-16944, CVE-2020-16945, CVE-2020-16946, CVE-2020-16950, CVE-2020-16951, CVE-2020-16952
Windows Media Player 1 CVE-2020-16915

 

Other Information

In addition to the Microsoft vulnerabilities included in the October Security Guidance, an advisory was released today.

October 2020 Adobe Flash Security Update [ADV200012]

Microsoft has released an advisory for Adobe Security Bulletin APSB20-58. This advisory contains updates for CVE-2020-9746.

 

The post ” VERT Threat Alert: October 2020 Patch Tuesday Analysis” appeared first on TripWire

Source:TripWire – Tyler Reguly

Tags: Microsoft, Patch Tuesday, TripWire

Continue Reading

Previous October Patch Tuesday: Microsoft Patches Critical, Wormable RCE Bug
Next SonicWall VPN Portal Critical Flaw (CVE-2020-5135)

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories

5 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

8 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

12 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign

13 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files

1 day ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns

1 day ago [email protected] (The Hacker News)

Recent Posts

  • ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories
  • The Buyer’s Guide to AI Usage Control
  • Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends
  • Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows
  • Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT