Patch three critical Windows vulnerabilities (CVE-2020-0601, CVE-2020-0609 & CVE-2020-0610) immediately to prevent potential cyber attack
Microsoft recently released its monthly Patch Tuesday for January 2020. There are three critical vulnerabilities in two of its application components which demand attention and immediate action:
| Windows Remote Desktop Protocol (RDP) Gateway Server (CVE-2020-0609, CVE-2020-0610) | Windows CryptoAPI (CVE-2020-0601) |
---|---|---|
Attack Mode |
|
|
Affected Products |
|
|
Recommendations:
On top of personal financial loss, the above-mentioned vulnerabilities will also have potential adverse impact on enterprises such as financial loss, data leakage, damage of trust and confidence and disruption of services.
As these high-risk vulnerabilities cover the latest versions of Microsoft Windows operating systems such as Windows 10 and Windows Server 2016/2019 and the Proof of Concept (PoC) exploit code for CVE-2020-06-01 is already available, actual attacks can come at any time! Hence, HKCERT strongly recommends the application of critical patches as soon as possible, especially for systems exposed to the Internet. For further details please refer to the below links:
- /my_url/en/alert/20011501
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0601
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0609
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0610
- https://www.us-cert.gov/ncas/alerts/aa20-014a
Share with