• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Computer security Latest Cybersecurity News SCCM

Microsoft Patch Tuesday April 2020 fixes 113 vulnerabilities including 3 zero day flaws

John Greenwood Posted On April 16, 2020
1



Microsoft Patch Tuesday April 2020

Microsoft has fixed 113 security vulnerabilities, including 37 remote code execution and 22 elevation of privilege vulnerabilities. Out of this 113 vulnerabilities, Microsoft has rated 15 to be critical, 93 as important, 3 as moderate and 2 as low. Considering the world is in a crisis, the system administrators must be under a substantial amount of pressure, so please be nice to them. 

Out of the three zero day vulnerabilities, two have been identified for being exploited in the wild. Users and sysadmins are advised to update these fixes to the earliest to keep their network safe and secured.

Three zero-day vulnerabilities that are fixed in Microsoft Patch Tuesday April 2020

CVE-2020-0935 – OneDrive for Windows elevation of privilege.

CVE-2020-1020– Adobe Font Manager Library remote code execution vulnerability

CVE-2020-0938– Adobe Font Manager Library remote code execution vulnerability

The two zero-day vulnerabilities in the Adobe Font Manager Library is a remote code execution flaw, and is found exploited in the wild. This vulnerability allows uniquely crafted multi master font- Adobe Type 1 PostScript format. If an attacker exploits this vulnerability, he code execute code remotely. In Windows 10, the attacker could execute code in an AppContainer with limited privileges. He could then, install programs, modify data or create new user accounts with admin privileges.

The Attacker could specially crafted malicious document or Windows preview pane to exploit this vulnerability.Though number of workaround were defined to mitigate this vulnerability, deploying this patch will fix the vulnerability completely. Users who have deployed those workarounds should undo them and deploy this security patch to fix the vulnerability permanently.

Microsoft Patch Tuesday April 2020 List of 15 critical vulnerabilities

S.NoCVE IDCVE Title
1CVE-2020-1022Dynamics Business Central Remote Code Execution Vulnerability
2CVE-2020-0687Microsoft Graphics Remote Code Execution Vulnerability
3CVE-2020-0907Microsoft Graphics Components Remote Code Execution Vulnerability
4CVE-2020-0931Microsoft SharePoint Remote Code Execution Vulnerability
5CVE-2020-0927Microsoft Office SharePoint XSS Vulnerability
6CVE-2020-0932Microsoft SharePoint Remote Code Execution Vulnerability
7CVE-2020-0929Microsoft SharePoint Remote Code Execution Vulnerability
8CVE-2020-0974Microsoft SharePoint Remote Code Execution Vulnerability
9CVE-2020-0969Chakra Scripting Engine Memory Corruption Vulnerability
10CVE-2020-0970Scripting Engine Memory Corruption Vulnerability
11CVE-2020-0965Microsoft Windows Codecs Library Remote Code Execution Vulnerability
12CVE-2020-0910Windows Hyper-V Remote Code Execution Vulnerability
13CVE-2020-0948Media Foundation Memory Corruption Vulnerability
14CVE-2020-0949Media Foundation Memory Corruption Vulnerability
15CVE-2020-0950Media Foundation Memory Corruption Vulnerability
15 critical vulnerabilities

Best way to update your systems with the security patches

Users can use the automated windows updates to download and update the patches, or employ manual updates to verify and update the patches as per convenience. 

Enterprises can employ patch management tools like WSUS, Ivanti, Solarwinds, PatchMyPC, Microsoft Endpoint Manager, SCCM, Atera, ConnectWise Automate and more. These tools will either work with WSUS or independently to automatically scan your network, identify the missing patches, test them in your environment, and deploy them to your target devices. These patch management tools can deploy patches to multiple platforms and third party applications.  

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit.   

Share the article with your friends


Microsoft Patch TuesdayMicrosoft Patch Tuesday Apr 2020Microsoft Patch Tuesday April 2020


Author

John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

You may also like
Microsoft Patch Tuesday January 2022 comes with 96 security updates
January 12, 2022
1 Comment

AqcfSeessynor
February 4, 2021 at 4:35 pm
Reply

cialis for sale in toronto where to buy cialis in calgary safely cialis a domicilio new jersey


Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Recast Software: Advanced Endpoint Management and Security...
      November 16, 2024
    • Patch My PC: Streamlined Software Management for ConfigMgr...
      November 9, 2024
    • Best Microsoft Intune Alternatives: Top 5 MDMs to Consider
      November 4, 2024
    • Top 11 Log Management Tools for Efficient System Management
      September 20, 2024
    • Top 5 Threat Intelligence Tools For 2024
      September 19, 2024


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search