Trustwave SpiderLabs Exposes Unique Cybersecurity Threats in the Public Sector. Learn More

Trustwave SpiderLabs Exposes Unique Cybersecurity Threats in the Public Sector. Learn More

Services
Capture
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

twi-managed-portal-color
Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

twi-briefcase-color-svg
Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

tw-laptop-data
Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

twi-database-color-svg
Database Security

Prevent unauthorized access and exceed compliance requirements.

twi-email-color-svg
Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

tw-officer
Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

tw-network
Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats
SpiderLabs Blog

Patch Tuesday, September 2019

For September 2019, Microsoft is releasing 78 CVEs. Of these CVEs, 17 are rated "Critical", 60 rated "Important", and one rated "Moderate". Additionally, this release includes the regular rollup patch for critical vulnerabilities in Adobe Flash, but you're no longer using Flash right?

The vulnerabilities rated as "Critical" include the standard ones affecting the scripting engine most often used during web browsing. Four new "Critical" CVEs have been issued for the Remote Desktop Client. After the Bluekeep (CVE-2019-0708) vulnerability was patched back in May, there has been a lot of focus on RDP and security. Luckily there are no known "in the wild" exploits for these new Remote Code Execution (RCE) vulnerabilities and even Bluekeep just received a beta module for Metasploit last week, three months after the patch release. This tells us what we should already know. If you can keep your patches up to date, you will greatly reduce your risk exposure. Also of interest on the "Critical" list are three CVEs covering RCE vulnerabilities in Microsoft SharePoint, a new RCE for Microsoft shortcuts (LNK files) and an RCE for Azure DevOps and Team Foundation Server.

On the list of "Important" CVEs the story is primarily about Privilege Escalation. Two CVEs were publicly disclosed before today's patches were released. One is for the Windows Text Service Framework (CVE-2019-1235) which was disclosed on Aug 23rd. The other is for Windows Secure Boot (CVE-2019-1294) where setting certain debug options for Secure Boot prior to a reboot could allow an attacker to bypass the secure reboot function in the future.

More importantly are two Privilege Escalation that have been seen exploited in the wild. One affects the Windows Common Log File System (CLFS) Driver (CVE-2019-1214) and the other affects the Winsock driver ws2ifsl.sys (CVE-2019-1215). Both are memory corruption issues that could allow an attacker that is already logged into a vulnerable system to elevate their user privilege to system level access.

Those two "in the wild" exploits alone should be enough to get everyone patching today, so I'll leave you admins to it and see you next month. Until then, stay safe.

 

Critical

Azure DevOps and Team Foundation Server Remote Code Execution Vulnerability
CVE-2019-1306
Remote Code Execution

Chakra Scripting Engine Memory Corruption Vulnerability
CVE-2019-1138, CVE-2019-1217, CVE-2019-1237, CVE-2019-1298, CVE-2019-1300
Remote Code Execution

LNK Remote Code Execution Vulnerability
CVE-2019-1280
Remote Code Execution

Microsoft SharePoint Remote Code Execution Vulnerability
CVE-2019-1257, CVE-2019-1295, CVE-2019-1296
Remote Code Execution

Remote Desktop Client Remote Code Execution Vulnerability
CVE-2019-0787, CVE-2019-0788, CVE-2019-1290, CVE-2019-1291
Remote Code Execution

Scripting Engine Memory Corruption Vulnerability
CVE-2019-1221
Remote Code Execution

VBScript Remote Code Execution Vulnerability
CVE-2019-1208, CVE-2019-1236
Remote Code Execution

September 2019 Adobe Flash Security Update
ADV190022
Remote Code Execution


Important

.NET Core Denial of Service Vulnerability
CVE-2019-1301
Denial of Service

.NET Framework Elevation of Privilege Vulnerability
CVE-2019-1142
Elevation of Privilege

Active Directory Federation Services XSS Vulnerability
CVE-2019-1273
Spoofing

ASP.NET Core Elevation Of Privilege Vulnerability
CVE-2019-1302
Elevation of Privilege

Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability
CVE-2019-1232
Elevation of Privilege

DirectWrite Information Disclosure Vulnerability
CVE-2019-1244, CVE-2019-1245, CVE-2019-1251
Information Disclosure

DirectX Elevation of Privilege Vulnerability
CVE-2019-1284, CVE-2019-1216
Information Disclosure

Jet Database Engine Remote Code Execution Vulnerability
CVE-2019-1240, CVE-2019-1241, CVE-2019-1242, CVE-2019-1243, CVE-2019-1246, CVE-2019-1247, CVE-2019-1248, CVE-2019-1249, CVE-2019-1250
Remote Code Execution

Lync 2013 Information Disclosure Vulnerability
CVE-2019-1209
Information Disclosure

Microsoft Browser Security Feature Bypass Vulnerability
CVE-2019-1220
Security Feature Bypass

Microsoft Compatibility Appraiser Elevation of Privilege Vulnerability
CVE-2019-1267
Elevation of Privilege

Microsoft Edge based on Edge HTML Information Disclosure Vulnerability
CVE-2019-1299
Information Disclosure

Microsoft Excel Information Disclosure Vulnerability
CVE-2019-1263
Information Disclosure

Microsoft Excel Remote Code Execution Vulnerability
CVE-2019-1297
Remote Code Execution

Microsoft Exchange Denial of Service Vulnerability
CVE-2019-1233
Denial of Service

Microsoft Exchange Spoofing Vulnerability
CVE-2019-1266
Spoofing

Microsoft Graphics Components Information Disclosure Vulnerability
CVE-2019-1283
Information Disclosure

Microsoft Office Security Feature Bypass Vulnerability
CVE-2019-1264
Security Feature Bypass

Microsoft Office SharePoint XSS Vulnerability
CVE-2019-1262
Spoofing

Microsoft SharePoint Elevation of Privilege Vulnerability
CVE-2019-1260
Elevation of Privilege

Microsoft SharePoint Spoofing Vulnerability
CVE-2019-1261
Spoofing

Microsoft Windows Store Installer Elevation of Privilege Vulnerability
CVE-2019-1270
Elevation of Privilege

Microsoft Yammer Security Feature Bypass Vulnerability
CVE-2019-1265
Security Feature Bypass

Rome SDK Information Disclosure Vulnerability
CVE-2019-1231
Information Disclosure

Team Foundation Server Cross-site Scripting Vulnerability
CVE-2019-1305
Spoofing

Win32k Elevation of Privilege Vulnerability
CVE-2019-1256, CVE-2019-1285
Elevation of Privilege

Windows ALPC Elevation of Privilege Vulnerability
CVE-2019-1269, CVE-2019-1272
Elevation of Privilege

Windows Audio Service Elevation of Privilege Vulnerability
CVE-2019-1277
Elevation of Privilege

Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2019-1214
Elevation of Privilege

Windows Common Log File System Driver Information Disclosure Vulnerability
CVE-2019-1282
Information Disclosure

Windows Denial of Service Vulnerability
CVE-2019-1292
Denial of Service

Windows Elevation of Privilege Vulnerability
CVE-2019-1215, CVE-2019-1253, CVE-2019-1303
Elevation of Privilege

Windows GDI Information Disclosure Vulnerability
CVE-2019-1252, CVE-2019-1286
Information Disclosure

Windows Hyper-V Denial of Service Vulnerability
CVE-2019-0928
Denial of Service

Windows Hyper-V Information Disclosure Vulnerability
CVE-2019-1254
Information Disclosure

Windows Kernel Information Disclosure Vulnerability
CVE-2019-1274
Information Disclosure

Windows Media Elevation of Privilege Vulnerability
CVE-2019-1271
Elevation of Privilege

Windows Network Connectivity Assistant Elevation of Privilege Vulnerability
CVE-2019-1287
Elevation of Privilege

Windows Secure Boot Security Feature Bypass Vulnerability
CVE-2019-1294
Security Feature Bypass

Windows SMB Client Driver Information Disclosure Vulnerability
CVE-2019-1293
Information Disclosure

Windows Text Service Framework Elevation of Privilege Vulnerability
CVE-2019-1235
Elevation of Privilege

Windows Transaction Manager Information Disclosure Vulnerability
CVE-2019-1219
Information Disclosure

Windows Update Delivery Optimization Elevation of Privilege Vulnerability
CVE-2019-1289
Elevation of Privilege

Winlogon Elevation of Privilege Vulnerability
CVE-2019-1268
Elevation of Privilege


Moderate

Microsoft SharePoint Spoofing Vulnerability
CVE-2019-1259
Spoofing

Latest SpiderLabs Blogs

2024 Public Sector Threat Landscape: Trustwave Threat Intelligence Briefing and Mitigation Strategies

Trustwave SpiderLabs’ 2024 Public Sector Threat Landscape: Trustwave Threat Intelligence Briefing and Mitigation Strategies report details the security issues facing public sector security teams as...

Read More

How to Create the Asset Inventory You Probably Don't Have

This is Part 12 in my ongoing project to cover 30 cybersecurity topics in 30 weekly blog posts. The full series can be found here.

Read More

Guardians of the Gateway: Identity and Access Management Best Practices

This is Part 10 in my ongoing project to cover 30 cybersecurity topics in 30 weekly blog posts. The full series can be found here.

Read More