Patch Impact Assessment September 2019

Vulnerability Assessment

3

PUBLICLY DISCLOSED

2

EXPLOITED

2

ZERO-DAY

This September update cycle brings two zero-days and three publicly reported vulnerabilities in the Windows platform. These two zero-days (CVE-2019-2014 and CVE-2019-1215) have credibly reported exploits which could lead to arbitrary code execution on the target machine. Both browser and Windows updates require immediate attention and your development team will need to spend some time with the latest patches to .NET and .NET Core.

Windows

Microsoft has attempted to address five critical vulnerabilities and a further 44 security issues that have been rated as important by Microsoft. The “elephant in the room” is the two zero-day publicly exploited vulnerabilities.

As mentioned previously, this is a big update, with credible reports of publicly exploited vulnerabilities on the Windows platform. Add this update to your “Patch Now” release schedule.

VULNERABILITIES

0
LOW

1
MODERATE

44
IMPORTANT

5
CRITICAL

PATCH NOW!

Browsers

Microsoft is working to address eight critical updates that could lead to a remote code execution scenario. A pattern is emerging with a recurring set of security issues raised against Chakra Scripting Engine, VBScript and Microsoft Scripting Engine.

All of these issues affect the most recent versions of Windows 10 (both 32-bit and 64-bit) and apply to both Edge and Internet Explorer (IE). The VBScript issues (CVE-2019-1208) and CVE-2019-1236) are particularly nasty as a visit to a website may lead to the inadvertent install of a malicious ActiveX control which then effectively cedes control to an attacker.

VULNERABILITIES

1
LOW

8
MODERATE

2
IMPORTANT

8
CRITICAL

PATCH NOW!

Office

Lync 2013 may not be your top priority this month, but the JET and SharePoint issues are serious and will require a response. The Microsoft JET database issues are the cause of most concern, even though Microsoft has rated them important, as they are key dependencies across a broad platform. Microsoft JET has always been difficult to debug and now it seems to be causing security issues every month for the past year.

Add this update to your standard patch  schedule, and make sure that all of your legacy database applications have been tested before a full roll-out.

VULNERABILITIES

0
LOW

1
MODERATE

7
IMPORTANT2

3
CRITICAL

SCHEDULE

Dev Tools

Critical updates to Chakra Core and Microsoft Team Foundation server will require immediate attention while the remaining patches should be included in the developer update release schedule. With upcoming major releases to .NET Core this November, we will continue to see large updates in this area. As always, we suggest some thorough testing and a staged release cadence for your development updates.

VULNERABILITIES

0
LOW

0
MODERATE

6
IMPORTANT

6
CRITICAL

SCHEDULE

Adobe Flash Player

Adobe is back on form with a critical update included in this month’s regular patch cycle. Adobe’s update (APSB19-46) addresses two memory related issues which could lead to arbitrary code execution on the target platform. Both security issues (CVE-2019-8070 and CVE-2019-8069) have a combined base CVSS score of 8.2, so we suggest that you add this critical update to your Patch Tuesday release schedule.

VULNERABILITIES

0
LOW

0
MODERATE

0
IMPORTANT

2
CRITICAL

PATCH NOW!

Leave a Comment

Your email address will not be published. Required fields are marked *

Understanding the Threatscape Report

The Readiness “Threatscape” report summarizes your risk of not applying this month’s patches, using all publicly-available vulnerability data.

It’s important to note that it’s equally important to know the risk to your applications if you DO apply this month’s patches. This is of course is dependent on:

  • The current state (version and build) of each platform (Windows, Office, Browser, etc.).
  • Which applications are part of your portfolio.

Luckily, determining the risk of applying patches is easy (and fast and dynamic, thanks to our Dynamic Platform Assessment tool.

To understand what will happen when you apply this month’s patches, contact us and assess your first 25 applications for free.

For each major platform, the pie chart shows the breakdown of vulnerabilities rated critical, important, moderate and low. These match the tables below the graph.

The size of the pie represents the total number of vulnerabilities. The larger the pie, the more vulnerabilities present.

The position of the pie on the vertical axis represents the relative risk to your application portfolio. The higher the position, the higher the exploitability.

Related Posts

Opinion

Microsoft’s Desktop Analytics is Here and it’s Free—Do you Get What you Pay For?

Analysing your desktop applications prior to migrating to a new system or doing a major update is vital. One of the major reasons why ‘software …

Read More
Patch Tuesday

Critical updates to Excel and publicly disclosed exploits make for an urgent November Patch Tuesday

This is a really big update for the Windows platform. And while we don’t have a zero-day vulnerability like September’s Patch Tuesday, there are two vulnerabilities that deserve our attention.

Read More
Patch Impact Assessment Summary

Patch Impact Assessment November 2019

Here’s our patch impact assessment for November’s Patch Tuesday.

Read More