Monday, January 25, 06:25
Home security Microsoft March 2020 Patch Tuesday fixes 115 vulnerabilities!

Microsoft March 2020 Patch Tuesday fixes 115 vulnerabilities!

Microsoft March 2020 Patch Tuesday-vulnerability security updatesAs part of Microsoft's March Patch Tuesday for 2020, which will unveil security updates, Microsoft released patches for 115 vulnerabilities identified in its products. Of these vulnerabilities, 24 are rated as critical, 88 as significant and 3 as moderate. Users should install the security updates recommended by Microsoft March 2020 Patch Tuesday as soon as possible to protect them. Windows from security risks.

Those interested in further information on non-security Windows updates can read the Windows 10 KB4540673 and KB4538461 updates.

There is, however, a strange case involving an error identified as CVE-2020-0796. Specifically, BleepingComputer reported that Microsoft was planning to release fixes for a "wormable" SMBv3 RCE vulnerability identified as CVE-2020-0796, but Microsoft never did so.Microsoft March 2020 Patch Tuesday-vulnerability security updates

There is not much information on this case, but the only sure thing was that it was a very serious vulnerability that looked like another kind of vulnerability, EternalBlue. While Microsoft never published any information about it, sites insurance companies such as Fortinet and Cisco Talos, published information about this vulnerability. Since then, Cisco Talos has removed it. According to Cisco Talos, this vulnerability leaves the systems exposed to a potential type attack worm. In addition, if hackers exploit this vulnerability, they will be able to target their victims very easily.

The BleepingComputer has sent many messages e-mail to Microsoft for this case, but has not received any response.
Among the vulnerabilities that occurred this month and are of particular interest is a vulnerability identified as CVE-2020-0872, entitled "Running remote code in Application Inspector ”, which can be used by a hacker to steal the source code of files opened in Application Inspector.

Finally, two new vulnerabilities were fixed that could allow hackers to create custom edited .LNK files or documents Word that can execute code when opened. The first vulnerability is identified as CVE-2020-0684 and is called "Remote Code Execution Vulnerability in LNK". This vulnerability allows one hacker to create malicious files LNK that can execute code. The second vulnerability is identified as CVE-2020-0852 and is called "Microsoft Word Remote Code Execution Vulnerability". This vulnerability allows a hacker to create malicious Word documents that can execute code simply by opening them. But the worst part is that this vulnerability works in its preview window Outlook.


Please enter your comment!
Please enter your name here


How to find your orders in the Amazon app

If you frequently use the Amazon app to buy items, you may find it convenient to see a list of all ...

Automatically move Gmail messages to a different tab

Often the emails we receive can fill our inbox, especially if we use our e-mail for business purposes ....

Google: How to view and delete the data it collects for you

There are some companies that people do not seem to trust much - one of them is Google. The reason...

Signal: How to check if your messages are private and secure?

The Signal messaging application has suddenly gained a large number of new users, which is due to the recent "scandal" of WhatsApp, which announced ...

Instagram: How to enable notifications for specific profiles

There are some profiles on Instagram where you want to see the content they publish as soon as possible - it can be a news ...

NASA's historic launch pad is to be demolished

NASA's famous Mobile Launcher Platform-2 launch platform, which has been linked to the Apollo and Space Shuttle missions, ...

Elon Musk: Gives $ 100 million for best CO2 capture technology Ο Elon Musk δήλωσε χθες, στο λογαριασμό του στο Twitter, ότι σκοπεύει να δώσει 100 εκατομμύρια...

How can you unblock sites and services using a VPN?

The Internet is free and open to all. However, there are some sites and services whose content is blocked, which ...

Google Chrome: How to manage your extensions?

Google Chrome extensions can be very useful, as they improve your productivity when using the browser.

Intel CPUs Review: Core i7-10700 vs Core i7-10700K!

Over the years, the Intel series of processors (CPUs) introduced the series of overclocking models "K" and more recently the series ...