Documentation


Published: June 15, 2020

Last Update: June 15, 2020

Author: SecureAuth Product Security Incident Response Team (psirt@secureauth.com)

Issue

On June 9, 2020, Microsoft released their monthly patches for Windows Operating Systems and applications.

The SecureAuth Product Security Team has reviewed the announced critical patches and determined that none of the announced vulnerabilities should be a high risk to the SecureAuth® Identity Platform (formerly SecureAuth IdP) as long as customers follow good security practices which include, but are not limited to:

  • Only authorized administrators should be permitted access to the Identity Platform server console or remote administrative services.
  • The Identity Platform should not be used to view any documents that are not verified from trusted sources, and the SecureAuth Product Security Team does not recommend viewing any documents on the Identity Platform server.
  • General web browsing should not be performed from the Identity Platform. Only visiting known, trusted web sites, such as secureauth.com or Microsoft.com, should be allowed and those visits directly from the Identity Platform should be minimized.

Recommendation

It is the recommendation of SecureAuth that the patches do not need to be applied immediately and customers can wait until further testing and analysis of the potential impacts to the server are better known throughout the security and Microsoft Communities.

Applies To

Identity Platform Version

OS Version

9.x

  • Windows Server 2012 R2
  • Windows Server 2016
  • Windows Server 2019

19.07.x

  • Windows Server 2016
  • Windows Server 2019

Summary

The June 2020 Microsoft Windows Patches identified 5 critical vulnerabilities and subsequent patches for all versions of Windows Server 2012 R2 and newer.

The 5 patches involved the following Windows components:

  • Windows OLE
  • LNK Files
  • Windows Cabinet (CAB) files
  • Windows Graphic Device Interface (GDI)
  • Windows Shell

None of the above components are directly related to the functionality of the Identity Platform and typically are only exploitable when a user is tricked into opening a malicious document or visiting a malicious web site.

Due to the nature of the Identity Platform server, it should never be used to open documents, visit websites other than to download authorized support or patch files, or be used for general web surfing.

Patch Information

CVE Number(s)

Component Impacted

Impact to Identity Platform

CVE-2020-1281

Windows OLE

None if good security practices are followed

CVE-2020-1299

LNK Files

None if good security practices are followed

CVE-2020-1300

Windows CAB Files

None if good security practices are followed

CVE-2020-1248

Windows GDI

None if good security practices are followed

CVE-2020-1286

Windows Shell

None if good security practices are followed

References

  • No labels