Microsoft Windows updates - May 2020
Published: May 12, 2020
Last Update: May 12, 2020
Author: SecureAuth Product Security Incident Response Team (psirt@secureauth.com)
Issue
On May 12, 2020 Microsoft released their monthly patches for Windows Operating Systems and applications.
The SecureAuth Product Security Team has reviewed the announced critical patches and determined that none of the announced vulnerabilities should be a high risk to the SecureAuth® Identity Platform (formerly SecureAuth IdP) as long as customers follow good security practices which include, but are not limited to:
Only authorized administrators should be permitted access to the Identity Platform server console or remote administrative services.
The Identity Platform should not be used to view any documents that are not verified from trusted sources, and the SecureAuth Product Security Team does not recommend viewing any documents on the Identity Platform server.
General web browsing should not be performed from the Identity Platform. Only visiting known, trusted web sites, such as secureauth.com or Microsoft.com, should be allowed and those visits directly from the Identity Platform should be minimized.
Recommendation
It is the recommendation of SecureAuth that the patches do not need to be applied immediately and customers can wait until further testing and analysis of the potential impacts to the server are better known throughout the security and Microsoft Communities.
Applies To
Identity Platform Version | OS Version |
---|---|
9.x |
|
19.07.x |
|
Summary
Critical Updates
The May 2020 Microsoft Windows Patches identified 5 critical vulnerabilities and subsequent patches for all versions of Windows Server 2012 R2 and newer.
The 5 patches involved the following Windows components:
Microsoft Color Management
Microsoft Graphics Components
Windows Media Foundation
None of the above components are directly related to the functionality of the SecureAuth Identity Platform and typically are only exploitable when a user is tricked into opening a malicious document or visiting a malicious web site.
Due to the nature of the Identity Platform server, it should never be used to open documents, visit websites other than to download authorized support or patch files, or be used for general web surfing.
Important Updates
In addition to the Critical Updates, Microsoft released a number of Important Updates that could result in the ability for an attacker to escalate privileges, perform a denial of service attack, or bypass security controls.
Additionally, there is a .NET Important Update that may result in a denial of service attack.
The Important Updates are all part of the monthly roll-up patches for the operating systems that SecureAuth supports (Windows Server 2012R2, 2016 and 2019).
The SecureAuth Team is testing these patches and will release information surrounding recommendations for implementing the Important Updates.
Patch Information
Critical Updates
CVE Number(s) | Component Impacted | Impact to Identity Platform |
---|---|---|
CVE-2020-1153 | Microsoft Graphics Components | None if good security practices are followed |
CVE-2020-1117 | Microsoft Color Management | None if good security practices are followed |
CVE-2020-1028 CVE-2020-1126 CVE-2020-1136 | Media Foundation | None if good security practices are followed |
Important Updates
CVE Number(s) | Component Impacted | Impact to Identity Platform |
---|---|---|
CVE-2020-1108 | .NET | Potential denial of service attack |
Various | Various Windows Components | Potential for privilege escalation, denial of service, or bypass of security controls |
References
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1028
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1108
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1117
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1126
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1136
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1153