Computer security

Microsoft Patch Tuesday April 2020 fixes 113 vulnerabilities including 3 zero day flaws

Microsoft has fixed 113 security vulnerabilities, including 37 remote code execution and 22 elevation of privilege vulnerabilities. Out of this 113 vulnerabilities, Microsoft has rated 15 to be critical, 93 as important, 3 as moderate and 2 as low. Considering the world is in a crisis, the system administrators must be under a substantial amount of pressure, so please be nice to them. 

Out of the three zero day vulnerabilities, two have been identified for being exploited in the wild. Users and sysadmins are advised to update these fixes to the earliest to keep their network safe and secured.

Three zero-day vulnerabilities that are fixed in Microsoft Patch Tuesday April 2020

CVE-2020-0935 – OneDrive for Windows elevation of privilege.

CVE-2020-1020– Adobe Font Manager Library remote code execution vulnerability

CVE-2020-0938– Adobe Font Manager Library remote code execution vulnerability

The two zero-day vulnerabilities in the Adobe Font Manager Library is a remote code execution flaw, and is found exploited in the wild. This vulnerability allows uniquely crafted multi master font- Adobe Type 1 PostScript format. If an attacker exploits this vulnerability, he code execute code remotely. In Windows 10, the attacker could execute code in an AppContainer with limited privileges. He could then, install programs, modify data or create new user accounts with admin privileges.

The Attacker could specially crafted malicious document or Windows preview pane to exploit this vulnerability.Though number of workaround were defined to mitigate this vulnerability, deploying this patch will fix the vulnerability completely. Users who have deployed those workarounds should undo them and deploy this security patch to fix the vulnerability permanently.

Microsoft Patch Tuesday April 2020 List of 15 critical vulnerabilities

S.NoCVE IDCVE Title
1CVE-2020-1022Dynamics Business Central Remote Code Execution Vulnerability
2CVE-2020-0687Microsoft Graphics Remote Code Execution Vulnerability
3CVE-2020-0907Microsoft Graphics Components Remote Code Execution Vulnerability
4CVE-2020-0931Microsoft SharePoint Remote Code Execution Vulnerability
5CVE-2020-0927Microsoft Office SharePoint XSS Vulnerability
6CVE-2020-0932Microsoft SharePoint Remote Code Execution Vulnerability
7CVE-2020-0929Microsoft SharePoint Remote Code Execution Vulnerability
8CVE-2020-0974Microsoft SharePoint Remote Code Execution Vulnerability
9CVE-2020-0969Chakra Scripting Engine Memory Corruption Vulnerability
10CVE-2020-0970Scripting Engine Memory Corruption Vulnerability
11CVE-2020-0965Microsoft Windows Codecs Library Remote Code Execution Vulnerability
12CVE-2020-0910Windows Hyper-V Remote Code Execution Vulnerability
13CVE-2020-0948Media Foundation Memory Corruption Vulnerability
14CVE-2020-0949Media Foundation Memory Corruption Vulnerability
15CVE-2020-0950Media Foundation Memory Corruption Vulnerability
15 critical vulnerabilities

Best way to update your systems with the security patches

Users can use the automated windows updates to download and update the patches, or employ manual updates to verify and update the patches as per convenience. 

Enterprises can employ patch management tools like WSUSIvantiSolarwindsPatchMyPCMicrosoft Endpoint ManagerSCCMAteraConnectWise Automate and more. These tools will either work with WSUS or independently to automatically scan your network, identify the missing patches, test them in your environment, and deploy them to your target devices. These patch management tools can deploy patches to multiple platforms and third party applications.  

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on FacebookLinkedinInstagramTwitter and Reddit.   

Share the article with your friends
John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

View Comments

Recent Posts

Top 5 Best Project Management Tools for Your Business

Explore efficiency with the Top 5 Best Project Management Software – streamline tasks, boost collaboration,…

2 months ago

Top 5 Best Free Antivirus for Android Smartphones: Stay Protected

Explore the top 5 best free antivirus apps for Android smartphones – your essential defense…

2 months ago

What is India’s Digital Personal Data Protection (DPDP)Act? Understanding Rights, Scope, Responsibilities, and Penalties

Unlocking India's DPDP Act: Your Guide to Rights, Responsibilities, and Top 5 Tools for 2024.…

3 months ago

Top 5 Best Data Loss Prevention Tools for 2024

Uncover insights on advanced features, performance, and user experiences. Discover the top 5 best Data…

3 months ago

Top 5 Windows Server Patching Tools for 2024

Unlock efficient Windows Server patching with insights on top tools and vendors. Streamline your cybersecurity…

3 months ago

Software Deployment: What it is, Best Practices and Top 5 Tools

Software deployment is the process of rolling out an application, which could occur manually or…

4 months ago