Trustwave SpiderLabs Uncovers Ov3r_Stealer Malware Spread via Phishing and Facebook Advertising. Learn More

Trustwave SpiderLabs Uncovers Ov3r_Stealer Malware Spread via Phishing and Facebook Advertising. Learn More

Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

Database Security

Prevent unauthorized access and exceed compliance requirements.

Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats
SpiderLabs Blog

Patch Tuesday March 2020

Today marks Microsoft's March Patch Tuesday. While it may not be on the top of everyone's March priority list, 116 CVEs suggest that you don't ignore this Patch Tuesday.

Of the 116 CVEs patched today, 26 are rated as "Critical" and represent the usual suspects we see month to month. Specifically, you'll find the various Remote Code Execution (RCE) vulnerabilities in the Windows Scripting Engine, which is used primarily in the Edge and Internet Explorer web browsers. Rounding out the Critical list are RCE vulnerabilities in Dynamics Business Central and in LNK files, where a malicious shortcut LNK file could trigger arbitrary code execution.

The list of CVEs rated as "Important" is a long one with 90 CVEs patched. The majority of the vulnerabilities are Elevation of Privilege, which attackers rely on to expand their access from a general low-level user to full system or even network access. This includes privilege escalation in Azure DevOps, Windows OS including the Kernel, and Microsoft Defender, a component that's supposed to bring more security, not introduce risk. There are also multiple RCE vulnerabilities in Microsoft Word, so don't accept any odd documents from strangers.

Luckily none of the CVEs patched today have any public exploits available, but as we all know, that's just a matter of time. So get to patching, and don't forget to wash your hands before and after!



Chakra Scripting Engine Memory Corruption Vulnerability
CVE-2020-0811, CVE-2020-0812
Remote Code Execution

Dynamics Business Central Remote Code Execution Vulnerability
Remote Code Execution

GDI+ Remote Code Execution Vulnerability
CVE-2020-0881, CVE-2020-0883
Remote Code Execution

LNK Remote Code Execution Vulnerability
Remote Code Execution

Media Foundation Memory Corruption Vulnerability
CVE-2020-0801, CVE-2020-0807, CVE-2020-0809, CVE-2020-0869
Remote Code Execution

Microsoft Browser Memory Corruption Vulnerability
CVE-2020-0768, CVE-2020-0830
Remote Code Execution

Microsoft Edge Memory Corruption Vulnerability
Remote Code Execution

Scripting Engine Memory Corruption Vulnerability
CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848
Remote Code Execution

VBScript Remote Code Execution Vulnerability
CVE-2020-0824, CVE-2020-0847
Remote Code Execution



Azure DevOps Elevation of Privilege Vulnerability
CVE-2020-0758, CVE-2020-0815
Elevation of Privilege

Azure DevOps Server Cross-site Scripting Vulnerability

Connected User Experiences and Telemetry Service Elevation of Privilege Vulnerability
Elevation of Privilege

Connected User Experiences and Telemetry Service Information Disclosure Vulnerability
Information Disclosure

Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability
CVE-2020-0810, CVE-2020-0793
Elevation of Privilege

DirectX Elevation of Privilege Vulnerability
Elevation of Privilege

Media Foundation Information Disclosure Vulnerability
Information Disclosure

Microsoft Defender Elevation of Privilege Vulnerability
CVE-2020-0762, CVE-2020-0763
Elevation of Privilege

Microsoft Exchange Server Spoofing Vulnerability

Microsoft IIS Server Tampering Vulnerability

Microsoft Office SharePoint XSS Vulnerability
CVE-2020-0893, CVE-2020-0894

Microsoft SharePoint Reflective XSS Vulnerability
CVE-2020-0795, CVE-2020-0891

Microsoft Visual Studio Spoofing Vulnerability

Microsoft Word Remote Code Execution Vulnerability
CVE-2020-0850, CVE-2020-0851, CVE-2020-0852, CVE-2020-0855, CVE-2020-0892
Remote Code Execution

Provisioning Runtime Elevation of Privilege Vulnerability
Elevation of Privilege

Remote Code Execution Vulnerability in Application Inspector
Remote Code Execution

Scripting Engine Information Disclosure Vulnerability
Information Disclosure

Service Fabric Elevation of Privilege
Elevation of Privilege

Visual Studio Extension Installer Service Denial of Service Vulnerability
Denial of Service

Win32k Elevation of Privilege Vulnerability
CVE-2020-0788, CVE-2020-0877, CVE-2020-0887
Elevation of Privilege

Win32k Information Disclosure Vulnerability
Information Disclosure

Windows ActiveX Installer Service Elevation of Privilege Vulnerability
CVE-2020-0770, CVE-2020-0773, CVE-2020-0860
Elevation of Privilege

Windows ALPC Elevation of Privilege Vulnerability
Elevation of Privilege

Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability
Elevation of Privilege

Windows CSC Service Elevation of Privilege Vulnerability
CVE-2020-0769, CVE-2020-0771
Elevation of Privilege

Windows Device Setup Manager Elevation of Privilege Vulnerability
Elevation of Privilege

Windows Elevation of Privilege Vulnerability
CVE-2020-0776, CVE-2020-0858
Elevation of Privilege

Windows Error Reporting Elevation of Privilege Vulnerability
CVE-2020-0772, CVE-2020-0806
Elevation of Privilege

Windows Error Reporting Information Disclosure Vulnerability
Information Disclosure

Windows GDI Information Disclosure Vulnerability
CVE-2020-0774, CVE-2020-0874, CVE-2020-0879, CVE-2020-0880, CVE-2020-0882
Information Disclosure

Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2020-0791, CVE-2020-0898
Elevation of Privilege

Windows Graphics Component Information Disclosure Vulnerability
Information Disclosure

Windows Hard Link Elevation of Privilege Vulnerability
CVE-2020-0840, CVE-2020-0841, CVE-2020-0896, CVE-2020-0849
Elevation of Privilege

Windows Imaging Component Information Disclosure Vulnerability
Information Disclosure

Windows Installer Elevation of Privilege Vulnerability
CVE-2020-0779, CVE-2020-0798, CVE-2020-0814, CVE-2020-0842, CVE-2020-0843
Elevation of Privilege

Windows Kernel Elevation of Privilege Vulnerability
Elevation of Privilege

Windows Language Pack Installer Elevation of Privilege Vulnerability
Elevation of Privilege

Windows Mobile Device Management Diagnostics Elevation of Privilege Vulnerability
Elevation of Privilege

Windows Modules Installer Service Information Disclosure Vulnerability
Information Disclosure

Windows Network Connections Service Elevation of Privilege Vulnerability
CVE-2020-0778, CVE-2020-0802, CVE-2020-0803, CVE-2020-0804, CVE-2020-0845
Elevation of Privilege

Windows Network Connections Service Information Disclosure Vulnerability
Information Disclosure

Windows Network Driver Interface Specification (NDIS) Information Disclosure Vulnerability
Information Disclosure

Windows Network List Service Elevation of Privilege Vulnerability
Elevation of Privilege

Windows Search Indexer Elevation of Privilege Vulnerability
Elevation of Privilege

Windows Tile Object Service Denial of Service Vulnerability
Denial of Service

Windows Update Orchestrator Service Elevation of Privilege Vulnerability
CVE-2020-0867, CVE-2020-0868
Elevation of Privilege

Windows UPnP Service Elevation of Privilege Vulnerability
CVE-2020-0781, CVE-2020-0783
Elevation of Privilege

Windows User Profile Service Elevation of Privilege Vulnerability
Elevation of Privilege

Windows Work Folder Service Elevation of Privilege Vulnerability
CVE-2020-0777, CVE-2020-0797, CVE-2020-0800, CVE-2020-0864, CVE-2020-0865, CVE-2020-0866, CVE-2020-0897
Elevation of Privilege


Defense in Depth 

Remote Desktop Connection Manager Information Disclosure Vulnerability
Information Disclosure

Latest SpiderLabs Blogs

Welcome to Adventures in Cybersecurity: The Defender Series

I’m happy to say I’m done chasing Microsoft certifications (AZ104/AZ500/SC100), and as a result, I’ve had the time to put some effort into a blog series that hopefully will entertain and inform you...

Read More

Trustwave SpiderLabs: Insights and Solutions to Defend Educational Institutions Against Cyber Threats

Security teams responsible for defending educational institutions at higher education and primary school levels often find themselves facing harsh lessons from threat actors who exploit the numerous...

Read More

Breakdown of Tycoon Phishing-as-a-Service System

Just weeks after Trustwave SpiderLabs reported on the Greatness phishing-as-a-service (PaaS) framework, SpiderLabs’ Email Security team is tracking another PaaS called Tycoon Group.

Read More