Patch Tuesday Webinar
Wednesday, June 10, 2020
Hosted by: Chris Goettl & Todd Schell
Dial in: 1-877-668-4490 (US)
Event ID: 282 075 115
Copyright©2019Ivanti.Allrightsreserved
Agenda
June 2020 Patch Tuesday Overview
In the News
Bulletins
Q & A
1
2
3
4
Copyright©2019Ivanti.Allrightsreserved
 Overview
Copyright©2019Ivanti.Allrightsreserved
Copyright©2019Ivanti.Allrightsreserved
 In the News
Copyright©2019Ivanti.Allrightsreserved
In The News . . .
 US-CERT Advisory for SMB vulnerability (Now actively exploited)
 https://www.us-cert.gov/ncas/current-activity/2020/06/05/unpatched-microsoft-systems-
vulnerable-cve-2020-0796
 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0796
 Windows 10 2004 Release Update
 https://blogs.windows.com/windowsexperience/2020/05/27/how-to-get-the-windows-10-
may-2020-update/
 https://techcommunity.microsoft.com/t5/windows-it-pro-blog/what-s-new-for-it-pros-in-
windows-10-version-2004/ba-p/1419764
 https://docs.microsoft.com/en-us/windows/release-information/status-windows-10-2004
 Microsoft 365 or the application formerly known as Office 365, O365, etc…
 https://docs.microsoft.com/en-us/deployoffice/update-channels-changes
 RDP is a target
 https://research.checkpoint.com/2020/reverse-rdp-the-path-not-taken/
Copyright©2019Ivanti.Allrightsreserved
US-CERT Advisory – SMB vulnerability actively exploited
Continuous Vulnerability Management is Critical
22 DaysMedian time to develop a
functional exploit
7 YearAverage life expectancy for an
exploited vulnerability
50%Of exploits occur within 14-28
days of patch availability
Copyright©2019Ivanti.Allrightsreserved
Microsoft Patch Tuesday Updates of Interest
 Advisory 990001 Latest Servicing Stack Updates (SSU)
 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV990001
 SSUs across the board!
 None are a pre-requisite for June updates
 Development Tool and Other Updates
 Azure DevOps Server 2019
 NuGetGallery
 Visual Studio 2015-2019
Source: Microsoft
Copyright©2019Ivanti.Allrightsreserved
Windows 10 Lifecycle Awareness
 Windows 10 Branch Support
Source: Microsoft
Copyright©2019Ivanti.Allrightsreserved
Windows 10 Lifecycle Awareness (cont)
 Enterprise LTSB/LTSC Support
 Complete Lifecycle Fact Sheet
 https://support.microsoft.com/en-us/help/13853/windows-lifecycle-fact-sheet
Source: Microsoft
Copyright©2019Ivanti.Allrightsreserved
Weekly Patch BLOG
 Latest Patch Releases
 Microsoft and Third-party
 Security and non-Security
 CVE Analysis
 Security Events of Interest
 Host: Brian Secrist
 https://www.ivanti.com/blog/
topics/patch-tuesday
Copyright©2019Ivanti.Allrightsreserved
Patch Content Announcement System
Announcements Now Posted on Community Forum Pages
 https://forums.ivanti.com/s/group/CollaborationGroup/00Ba0000009oKICEA2
 Subscribe to receive email for the desired product(s)
Copyright©2019Ivanti.Allrightsreserved
 Bulletins
Copyright©2019Ivanti.Allrightsreserved
APSB20-30: Security Update for Adobe Flash Player
 Maximum Severity: Critical
 Affected Products: Adobe Flash Player for Desktop Runtime, Google Chrome,
Internet Explorer 11 and Edge
 Description: Adobe has released security updates for Adobe Flash Player for
Windows, macOS, Linux and Chrome OS. These updates address a critical
vulnerability in Adobe Flash Player. Successful exploitation could lead to arbitrary code
execution in the context of the current user.
 Impact: Remote Code Execution
 Fixes 1 Vulnerability: CVE-2020-9633
 Restart Required: Requires application restart
NOTE: Adobe Flash Player will go out of support by December 31, 2020.
Copyright©2019Ivanti.Allrightsreserved
MS20-06-AFP: Security Update for Adobe Flash Player
 Maximum Severity: Critical
 Affected Products: Adobe Flash Player
 Description: This security update resolves vulnerabilities in Adobe Flash Player that is
installed on Windows 10, versions 1607 through 2004, Windows Server 2016 and
Server 2019, Windows 10 (initial release), Windows Server 2012 R2, Windows RT 8.1,
Windows 8.1, and Windows Server 2012. This bulletin is based on KB 4461600 and
ADV200010.
 Impact: Remote Code Execution
 Fixes 1 Vulnerability: CVE-2020-9633
 Restart Required: Requires application restart
NOTE: Adobe Flash Player will go out of support by December 31, 2020.
Copyright©2019Ivanti.Allrightsreserved
MS20-06-W10: Windows 10 Update
 Maximum Severity: Critical
 Affected Products: Microsoft Windows 10 Versions 1607, 1703, 1709, 1803, 1809,
1903, 1909, 2004, Server 2016, Server 2019, Server 1709, Server 1803, Server 2004,
IE 11 and Microsoft Edge (HTML and Chromium)
 Description: This bulletin references 13 KB articles. See KBs for the list of changes.
 Impact: Remote Code Execution, Security Feature Bypass, Spoofing, Denial of
Service, Elevation of Privilege and Information Disclosure
 Fixes 105 Vulnerabilities: No CVEs are known exploited or publicly disclosed. See
Details column of Security Update Guide for the complete list of CVEs.
 Restart Required: Requires restart
 Known Issues: See next slides
Copyright©2019Ivanti.Allrightsreserved
June Known Issues for Windows 10
 KB 4561616 – Windows 10, Version 1607 and Server 2016
 [Min Password] After installing KB4467684, the cluster service may fail to start with the error
“2245 (NERR_PasswordTooShort)” if the group policy “Minimum Password Length” is
configured with greater than 14 characters. Workaround: Set the domain default "Minimum
Password Length" policy to less than or equal to 14 characters. Microsoft is working on a
resolution.
 KB 4561608 – Windows 10, Version 1809, Server 2019 All Versions
 [Asian Packs] After installing KB 4493509, devices with some Asian language packs installed
may receive the error, "0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_FOUND.“
Workaround: Uninstall and reinstall any recently added language packs or select Check for
Updates and install the April 2019 Cumulative Update. See KB for more recovery details.
Microsoft is working on a resolution.
Copyright©2019Ivanti.Allrightsreserved
June Known Issues for Windows 10 (cont)
 KB 4560960 – Windows 10 version 1903, Windows Server version 1903,
Windows 10 version 1909, Windows Server version 1909
 [Modem] After installing this update on a Windows 10 device with a wireless wide area network
(WWAN) LTE modem, reaching the internet might not be possible. However, the Network
Connectivity Status Indicator (NCSI) in the notification area might still indicate that you are
connected to the internet. Workaround: None. Microsoft is working on a resolution.
Copyright©2019Ivanti.Allrightsreserved
MS20-06-IE: Security Updates for Internet Explorer
 Maximum Severity: Critical
 Affected Products: Microsoft Internet Explorer 9 and11
 Description: The fixes that are included in the cumulative Security Update for Internet
Explorer are also included in the June 2020 Security Monthly Quality Rollup. Installing
either the Security Update for Internet Explorer or the Security Monthly Quality Rollup
installs the fixes that are in the cumulative update. This bulletin references 11 KB
articles.
 Impact: Remote Code Execution and Information Disclosure
 Fixes 7 Vulnerabilities in IE 9 and 8 Vulnerabilities in IE 11: CVE-2020-1213,
CVE-2020-1214, CVE-2020-1215, CVE-2020-1216, CVE-2020-1219, CVE-2020-1230,
CVE-2020-1260, CVE-2020-1315
 Restart Required: Requires browser restart
 Known Issues: None reported
Copyright©2019Ivanti.Allrightsreserved
MS20-06-MR2K8-ESU: Monthly Rollup for Windows Server 2008
 Maximum Severity: Critical
 Affected Products: Microsoft Windows Server 2008 and IE 9
 Description: This security update includes improvements and fixes that were a part of
update KB 4556860 (released May 12, 2020). Bulletin is based on KB 4561670.
Security updates to Windows App Platform and Frameworks, Windows Kernel,
Microsoft Graphics Component, Windows Input and Composition, Windows Media,
Windows Cloud Infrastructure, Windows Peripherals, Windows File Server and
Clustering, Windows Hybrid Storage Services, the Microsoft Scripting Engine, and the
Microsoft JET Database Engine.
 Impact: Remote Code Execution, Denial of Service, Elevation of Privilege, and
Information Disclosure
 Fixes 26 + 7 (IE 9) Vulnerabilities: No CVEs are publicly disclosed or known
exploited. See the Security Update Guide for the complete list of CVEs.
 Restart Required: Requires restart
 Known Issues: [ESU Fail] See next slide.
Copyright©2019Ivanti.Allrightsreserved
June Known Issues for Server 2008
 KB 4561670 – Windows Server 2008 (Monthly Rollup)
 [ESU Fail] After installing this update and restarting your device, you might receive the error,
“Failure to configure Windows updates. Reverting Changes. Do not turn off your computer”, and
the update might show as Failed in Update History.
Workaround: This is expected in the following circumstances:
• If you are installing this update on a device that is running an edition that is not supported
for ESU. For a complete list of which editions are supported, see KB 4497181.
• If you do not have an ESU MAK add-on key installed and activated.
If you have purchased an ESU key and have encountered this issue, please verify you have
applied all prerequisites and that your key is activated.
 https://support.microsoft.com/en-us/help/4522133/procedure-to-continue-receiving-security-
updates
 KB 4561645 – Windows Server 2008 (Security-only Update)
Copyright©2019Ivanti.Allrightsreserved
MS20-06-SO2K8-ESU: Security-only Update for Windows Server 2008
 Maximum Severity: Critical
 Affected Products: Microsoft Windows Server 2008
 Description: This bulletin is based on KB 4561645. Security updates to Windows App
Platform and Frameworks, Windows Kernel, Microsoft Graphics Component, Windows
Input and Composition, Windows Media, Windows Cloud Infrastructure, Windows
Peripherals, Windows File Server and Clustering, Windows Hybrid Storage Services,
and the Microsoft JET Database Engine.
 Impact: Remote Code Execution, Denial of Service, Elevation of Privilege, and
Information Disclosure
 Fixes 26 Vulnerabilities: No CVEs are publicly disclosed or known exploited. See
the Security Update Guide for the complete list of CVEs.
 Restart Required: Requires restart
 Known Issues: [ESU Fail]
Copyright©2019Ivanti.Allrightsreserved
MS20-06-MR7-ESU: Monthly Rollup for Win 7
MS20-06-MR2K8R2-ESU Monthly Rollup for Server 2008 R2
 Maximum Severity: Critical
 Affected Products: Microsoft Windows 7, Server 2008 R2, and IE
 Description: This security update includes improvements and fixes that were a part of
update KB 4556836 (released May 12, 2020). Bulletin is based on KB 4561643.
Security updates to Windows App Platform and Frameworks, Windows Kernel,
Microsoft Graphics Component, Windows Input and Composition, Windows Media,
Windows Shell, Windows Cloud Infrastructure, Windows Fundamentals, Windows
Storage and Filesystems, Windows File Server and Clustering, Windows Hybrid Storage
Services, the Microsoft Scripting Engine, and the Microsoft JET Database Engine.
 Impact: Remote Code Execution, Denial of Service, Elevation of Privilege, and
Information Disclosure
 Fixes 30 + 8 IE Vulnerabilities: No CVEs are publicly disclosed or known exploited.
See the Security Update Guide for the complete list of CVEs.
 Restart Required: Requires restart
 Known Issues: [ESU Fail]
Copyright©2019Ivanti.Allrightsreserved
MS20-06-SO7-ESU: Security-only Update for Win 7
MS20-06-SO2K8R2-ESU: Security-only Update for Server 2008 R2
 Maximum Severity: Critical
 Affected Products: Microsoft Windows 7 SP1, Server 2008 R2 SP1
 Description: Bulletin is based on KB 4561669. Security updates to Windows App
Platform and Frameworks, Windows Kernel, Microsoft Graphics Component, Windows
Input and Composition, Windows Media, Windows Shell, Windows Cloud
Infrastructure, Windows Fundamentals, Windows Storage and Filesystems, Windows
File Server and Clustering, Windows Hybrid Storage Services, and the Microsoft JET
Database Engine.
 Impact: Remote Code Execution, Denial of Service, Elevation of Privilege, and
Information Disclosure
 Fixes 30 Vulnerabilities: No CVEs are publicly disclosed or known exploited. See
the Security Update Guide for the complete list of CVEs.
 Restart Required: Requires restart
 Known Issues: [ESU Fail]
Copyright©2019Ivanti.Allrightsreserved
MS20-06-MR8: Monthly Rollup for Server 2012
 Maximum Severity: Critical
 Affected Products: Microsoft Server 2012 and IE
 Description: This security update includes improvements and fixes that were a part of
update KB 4556840 (released May 12, 2020). Bulletin is based on KB 4561612.
Security updates to Windows App Platform and Frameworks, Windows Kernel,
Microsoft Graphics Component, Windows Input and Composition, Windows Media,
Windows Shell, Windows Cloud Infrastructure, Windows Fundamentals, Windows
Peripherals, Windows File Server and Clustering, Windows Hybrid Storage Services,
the Microsoft Scripting Engine, and the Microsoft JET Database Engine.
 Impact: Remote Code Execution, Denial of Service, Elevation of Privilege, and
Information Disclosure
 Fixes 36 + 8 IE Vulnerabilities: No CVEs are publicly disclosed or known exploited.
See the Security Update Guide for the complete list of CVEs.
 Restart Required: Requires restart
 Known Issues: None reported
Copyright©2019Ivanti.Allrightsreserved
MS20-06-SO8: Security-only Update for Server 2012
 Maximum Severity: Critical
 Affected Products: Microsoft Server 2012
 Description: Bulletin is based on KB 4561674. Security updates to Windows App
Platform and Frameworks, Windows Kernel, Microsoft Graphics Component, Windows
Input and Composition, Windows Media, Windows Shell, Windows Cloud
Infrastructure, Windows Fundamentals, Windows Peripherals, Windows File Server
and Clustering, Windows Hybrid Storage Services, and the Microsoft JET Database
Engine.
 Impact: Remote Code Execution, Denial of Service, Elevation of Privilege, and
Information Disclosure
 Fixes 36 Vulnerabilities: No CVEs are publicly disclosed or known exploited. See
the Security Update Guide for the complete list of CVEs.
 Restart Required: Requires restart
 Known Issues: None reported
Copyright©2019Ivanti.Allrightsreserved
MS20-06-MR81: Monthly Rollup for Win 8.1 and Server 2012 R2
 Maximum Severity: Critical
 Affected Products: Microsoft Windows 8.1, Server 2012 R2, and IE
 Description: This security update includes improvements and fixes that were a part of
update KB 4556846 (released May 12, 2020). Bulletin is based on KB 4561666.
Security updates to Internet Explorer, the Microsoft Scripting Engine, Windows App
Platform and Frameworks, Windows Input and Composition, Windows Media, Windows
Kernel, Windows Core Networking, Internet Information Services, Windows Network
Security and Containers, Windows Active Directory, the Microsoft JET Database
Engine, and Windows Storage and Filesystems.
 Impact: Remote Code Execution, Denial of Service, Elevation of Privilege, and
Information Disclosure
 Fixes 37 + 8 IE Vulnerabilities: No CVEs are publicly disclosed or known exploited.
See the Security Update Guide for the complete list of CVEs.
 Restart Required: Requires restart
 Known Issues: None reported
Copyright©2019Ivanti.Allrightsreserved
MS20-06-SO81: Security-only Update for Win 8.1 and Server 2012 R2
 Maximum Severity: Critical
 Affected Products: Microsoft Windows 8.1, Server 2012 R2
 Description: Bulletin is based on KB 4561673. Security updates to Windows App
Platform and Frameworks, Windows Kernel, Microsoft Graphics Component, Windows
Input and Composition, Windows Media, Windows Shell, Windows Cloud
Infrastructure, Windows Fundamentals, Windows File Server and Clustering, Windows
Hybrid Storage Services, and the Microsoft JET Database Engine.
 Impact: Remote Code Execution, Denial of Service, Elevation of Privilege, and
Information Disclosure
 Fixes 37 Vulnerabilities: No CVEs are publicly disclosed or known exploited. See
the Security Update Guide for the complete list of CVEs.
 Restart Required: Requires restart
 Known Issues: None reported
Copyright©2019Ivanti.Allrightsreserved
MS20-06-SPT: Security Updates for SharePoint Server
 Maximum Severity: Critical
 Affected Products: Microsoft SharePoint Enterprise Server 2013 & 2016, Microsoft
SharePoint Foundation Server 2010 & 2013, and Microsoft SharePoint Server 2010 &
2019
 Description: This security update resolves vulnerabilities in Microsoft Office that could
allow remote code execution if a user opens a specially crafted Office file. This bulletin
is based on 6 KB articles.
 Impact: Remote Code Execution, Spoofing, and Elevation of Privilege
 Fixes 12 Vulnerabilities: No CVEs are publicly disclosed or known exploited. See
the Security Update Guide for the complete list of CVEs.
 Restart Required: Requires Restart
 Known Issues: None reported
Copyright©2019Ivanti.Allrightsreserved
MS20-06-OFF: Security Updates for Microsoft Office
 Maximum Severity: Important
 Affected Products: Excel 2010-2016, Office 2010-2016, Project 2010-2016, Word 2010-2016 +
Word for Android, Office 2016 and 2019 for Mac
 Description: This security update resolves a security feature bypass vulnerability that exists if
Microsoft Outlook or another relevant product does not enforce security settings that are configured
on a system. This security update also resolves a memory vulnerability in Microsoft Excel which
could be exploited to run malicious as the active user. This security update resolves an information
disclosure vulnerability that exists if Microsoft Project software reads out-of-bound memory because
of an uninitialized variable. This bulletin references 7 KB articles plus release notes for MacOS.
 Impact: Remote Code Execution, Security Feature Bypass, and Information Disclosure
 Fixes 6 Vulnerabilities: CVE-2020-1223, CVE-2020-1225, CVE-2020-1226, CVE-2020-1229,
CVE-2020-1321, CVE-2020-1322
 Restart Required: Requires application restart
 Known Issues: None reported
Copyright©2019Ivanti.Allrightsreserved
MS20-06-O365: Security Updates Microsoft 365 Apps and Office 2019
 Maximum Severity: Important
 Affected Products: Microsoft 365 Apps, Office 2019
 Description: This month’s update resolved various bugs and performance issues in
Microsoft 365 Apps and Office 2019 applications. Information on Microsoft 365 Apps
security updates is available at https://docs.microsoft.com/en-
us/officeupdates/microsoft365-apps-security-updates.
 Impact: Remote Code Execution, Security Feature Bypass, and Information
Disclosure
 Fixes 5 Vulnerabilities: CVE-2020-1225, CVE-2020-1226, CVE-2020-1229, CVE-
2020-1321, CVE-2020-1322
 Restart Required: Requires application restart
 Known Issues: None reported
Note: Office 365 ProPlus has been renamed Microsoft 365 Apps for Enterprise!
Copyright©2019Ivanti.Allrightsreserved
Between Patch Tuesday’s
New Product Support: Plantronics Hub
Security Updates: Adobe Acrobat (2), Box Edit (1), Camtasia (1), CCleaner (1), Crowdstrike Falcon
Sensor (1), Citrix Workspace App (2), Dropbox (2), Firefox (2), Firefox ESR (1), FileZilla (1), GoodSync
(4), Google Chrome (2), Google Earth Pro (1), GIT for Windows (1), iCloud (1), iTunes (1), LibreOffice
(1), LogMeIn (1), Microsoft (5), Nitro Pro (2), Node.JS (5), Opera (2), Oracle Virtualbox (4), PowerBI
Desktop (2), Paint.net (1), Plex Media Player (2), Plex Media Server (4), PeaZip (2), Skype (1), Slack
Machine-Wide Installer (1), Splunk Forwarder (1), Tableau Desktop (8), Tableau Reader (1),
Thunderbird (2), Tomcat (1), TortoiseSVN (1), TeamViewer (2), VMware Workstation (2), Visual Studio
Code (1), WinSCP (1), Wireshark (3), Zoom Client (3), Zoom Outlook Plugin (1)
Non-Security Updates: Audacity (1), BlueJeans (2), Box Drive (1), Box Sync (1), CutePDF (1),
Google Drive (1), GOM Player (1), Microsoft (25), Plantronics Hub (1), R for Windows (1), RealVNC
Server (1), WebEx Teams (2), XnView (1)
Copyright©2019Ivanti.Allrightsreserved
Third Party CVE Information
 Apple iCloud 7.19.0.10
 ICLOUD-200527, QICLOUD719010
 Fixes 12 Vulnerabilities: CVE-2020-3878, CVE-2020-9789, CVE-2020-9790, CVE-2020-9794, CVE-
2020-9800, CVE-2020-9802, CVE-2020-9803, CVE-2020-9805, CVE-2020-9806, CVE-2020-9807, CVE-
2020-9843, CVE-2020-9850
 Google Chrome 83.0.4103.61
 CHROME-200519, QGC830410361
 Fixes 27 Vulnerabilities: CVE-2020-6465, CVE-2020-6466, CVE-2020-6467, CVE-2020-
6468, CVE-2020-6469, CVE-2020-6470, CVE-2020-6471, CVE-2020-6472, CVE-2020-
6473, CVE-2020-6474, CVE-2020-6475, CVE-2020-6476, CVE-2020-6477, CVE-2020-
6478, CVE-2020-6479, CVE-2020-6480, CVE-2020-6481, CVE-2020-6482, CVE-2020-
6483, CVE-2020-6484, CVE-2020-6485, CVE-2020-6486, CVE-2020-6487, CVE-2020-
6488, CVE-2020-6489, CVE-2020-6490, CVE-2020-6491
 Google Chrome 83.0.4103.97
 CHROME-200603, QGC830410397
 Fixes 6 Vulnerabilities: CVE-2020-6493, CVE-2020-6494, CVE-2020-6495, CVE-2020-
6496, CVE-2020-6497, CVE-2020-6498
Copyright©2019Ivanti.Allrightsreserved
Third Party CVE Information (cont)
 Firefox ESR 68.9.0
 FFE-200602, QFFE6890
 Fixes 2 Vulnerabilities: CVE-2020-12399,CVE-2020-12405
 Firefox 77.0
 FF-200602, QFF770
 Fixes 7 Vulnerabilities: CVE-2020-12399, CVE-2020-12405, CVE-2020-12406, CVE-
2020-12407, CVE-2020-12408, CVE-2020-12409, CVE-2020-12411
 iTunes 12.10.7.3
 AI-200522, QAI121073
 Fixes 12 Vulnerabilities: CVE-2020-3878, CVE-2020-9789, CVE-2020-9790, CVE-
2020-9794, CVE-2020-9800, CVE-2020-9802, CVE-2020-9803, CVE-2020-9805, CVE-
2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850
 Microsoft Edge 83.0.478.45
 MEDGE-200604, QMEDGE83047845
 Fixes 4 Vulnerabilities: CVE-2020-6493, CVE-2020-6494, CVE-2020-6495, CVE-
2020-6496
Copyright©2019Ivanti.Allrightsreserved
Third Party CVE Information (cont)
 Node.JS 10.21.0 (LTS Lower)
 NOJSLL-200602, QNODEJSLL10210
 Fixes 3 Vulnerabilities: CVE-2020-8174,CVE-2020-10531,CVE-2020-11080
 Node.JS 12.18.0 (LTS Upper)
 NOJSLU-200602, QNODEJSLU12180
 Fixes 3 Vulnerabilities: CVE-2020-8172, CVE-2020-8174, CVE-2020-11080
 Node.JS 14.4.0 (Current)
 NOJSC-200602, QNODEJSC1440
 Fixes 3 Vulnerabilities: CVE-2020-8172, CVE-2020-8174, CVE-2020-11080
 Thunderbird 68.9.0
 TB-200604, QTB6890
 Fixes 3 Vulnerabilities: CVE-2020-12399, CVE-2020-12405, CVE-2020-
12406, CVE-2020-12410
Copyright©2019Ivanti.Allrightsreserved
Thank You

Ivanti Patch Tuesday for June 2020

  • 1.
    Patch Tuesday Webinar Wednesday,June 10, 2020 Hosted by: Chris Goettl & Todd Schell Dial in: 1-877-668-4490 (US) Event ID: 282 075 115
  • 2.
    Copyright©2019Ivanti.Allrightsreserved Agenda June 2020 PatchTuesday Overview In the News Bulletins Q & A 1 2 3 4
  • 3.
  • 4.
  • 5.
  • 6.
    Copyright©2019Ivanti.Allrightsreserved In The News. . .  US-CERT Advisory for SMB vulnerability (Now actively exploited)  https://www.us-cert.gov/ncas/current-activity/2020/06/05/unpatched-microsoft-systems- vulnerable-cve-2020-0796  https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0796  Windows 10 2004 Release Update  https://blogs.windows.com/windowsexperience/2020/05/27/how-to-get-the-windows-10- may-2020-update/  https://techcommunity.microsoft.com/t5/windows-it-pro-blog/what-s-new-for-it-pros-in- windows-10-version-2004/ba-p/1419764  https://docs.microsoft.com/en-us/windows/release-information/status-windows-10-2004  Microsoft 365 or the application formerly known as Office 365, O365, etc…  https://docs.microsoft.com/en-us/deployoffice/update-channels-changes  RDP is a target  https://research.checkpoint.com/2020/reverse-rdp-the-path-not-taken/
  • 7.
  • 8.
    Continuous Vulnerability Managementis Critical 22 DaysMedian time to develop a functional exploit 7 YearAverage life expectancy for an exploited vulnerability 50%Of exploits occur within 14-28 days of patch availability
  • 9.
    Copyright©2019Ivanti.Allrightsreserved Microsoft Patch TuesdayUpdates of Interest  Advisory 990001 Latest Servicing Stack Updates (SSU)  https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV990001  SSUs across the board!  None are a pre-requisite for June updates  Development Tool and Other Updates  Azure DevOps Server 2019  NuGetGallery  Visual Studio 2015-2019 Source: Microsoft
  • 10.
    Copyright©2019Ivanti.Allrightsreserved Windows 10 LifecycleAwareness  Windows 10 Branch Support Source: Microsoft
  • 11.
    Copyright©2019Ivanti.Allrightsreserved Windows 10 LifecycleAwareness (cont)  Enterprise LTSB/LTSC Support  Complete Lifecycle Fact Sheet  https://support.microsoft.com/en-us/help/13853/windows-lifecycle-fact-sheet Source: Microsoft
  • 12.
    Copyright©2019Ivanti.Allrightsreserved Weekly Patch BLOG Latest Patch Releases  Microsoft and Third-party  Security and non-Security  CVE Analysis  Security Events of Interest  Host: Brian Secrist  https://www.ivanti.com/blog/ topics/patch-tuesday
  • 13.
    Copyright©2019Ivanti.Allrightsreserved Patch Content AnnouncementSystem Announcements Now Posted on Community Forum Pages  https://forums.ivanti.com/s/group/CollaborationGroup/00Ba0000009oKICEA2  Subscribe to receive email for the desired product(s)
  • 14.
  • 15.
    Copyright©2019Ivanti.Allrightsreserved APSB20-30: Security Updatefor Adobe Flash Player  Maximum Severity: Critical  Affected Products: Adobe Flash Player for Desktop Runtime, Google Chrome, Internet Explorer 11 and Edge  Description: Adobe has released security updates for Adobe Flash Player for Windows, macOS, Linux and Chrome OS. These updates address a critical vulnerability in Adobe Flash Player. Successful exploitation could lead to arbitrary code execution in the context of the current user.  Impact: Remote Code Execution  Fixes 1 Vulnerability: CVE-2020-9633  Restart Required: Requires application restart NOTE: Adobe Flash Player will go out of support by December 31, 2020.
  • 16.
    Copyright©2019Ivanti.Allrightsreserved MS20-06-AFP: Security Updatefor Adobe Flash Player  Maximum Severity: Critical  Affected Products: Adobe Flash Player  Description: This security update resolves vulnerabilities in Adobe Flash Player that is installed on Windows 10, versions 1607 through 2004, Windows Server 2016 and Server 2019, Windows 10 (initial release), Windows Server 2012 R2, Windows RT 8.1, Windows 8.1, and Windows Server 2012. This bulletin is based on KB 4461600 and ADV200010.  Impact: Remote Code Execution  Fixes 1 Vulnerability: CVE-2020-9633  Restart Required: Requires application restart NOTE: Adobe Flash Player will go out of support by December 31, 2020.
  • 17.
    Copyright©2019Ivanti.Allrightsreserved MS20-06-W10: Windows 10Update  Maximum Severity: Critical  Affected Products: Microsoft Windows 10 Versions 1607, 1703, 1709, 1803, 1809, 1903, 1909, 2004, Server 2016, Server 2019, Server 1709, Server 1803, Server 2004, IE 11 and Microsoft Edge (HTML and Chromium)  Description: This bulletin references 13 KB articles. See KBs for the list of changes.  Impact: Remote Code Execution, Security Feature Bypass, Spoofing, Denial of Service, Elevation of Privilege and Information Disclosure  Fixes 105 Vulnerabilities: No CVEs are known exploited or publicly disclosed. See Details column of Security Update Guide for the complete list of CVEs.  Restart Required: Requires restart  Known Issues: See next slides
  • 18.
    Copyright©2019Ivanti.Allrightsreserved June Known Issuesfor Windows 10  KB 4561616 – Windows 10, Version 1607 and Server 2016  [Min Password] After installing KB4467684, the cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the group policy “Minimum Password Length” is configured with greater than 14 characters. Workaround: Set the domain default "Minimum Password Length" policy to less than or equal to 14 characters. Microsoft is working on a resolution.  KB 4561608 – Windows 10, Version 1809, Server 2019 All Versions  [Asian Packs] After installing KB 4493509, devices with some Asian language packs installed may receive the error, "0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_FOUND.“ Workaround: Uninstall and reinstall any recently added language packs or select Check for Updates and install the April 2019 Cumulative Update. See KB for more recovery details. Microsoft is working on a resolution.
  • 19.
    Copyright©2019Ivanti.Allrightsreserved June Known Issuesfor Windows 10 (cont)  KB 4560960 – Windows 10 version 1903, Windows Server version 1903, Windows 10 version 1909, Windows Server version 1909  [Modem] After installing this update on a Windows 10 device with a wireless wide area network (WWAN) LTE modem, reaching the internet might not be possible. However, the Network Connectivity Status Indicator (NCSI) in the notification area might still indicate that you are connected to the internet. Workaround: None. Microsoft is working on a resolution.
  • 20.
    Copyright©2019Ivanti.Allrightsreserved MS20-06-IE: Security Updatesfor Internet Explorer  Maximum Severity: Critical  Affected Products: Microsoft Internet Explorer 9 and11  Description: The fixes that are included in the cumulative Security Update for Internet Explorer are also included in the June 2020 Security Monthly Quality Rollup. Installing either the Security Update for Internet Explorer or the Security Monthly Quality Rollup installs the fixes that are in the cumulative update. This bulletin references 11 KB articles.  Impact: Remote Code Execution and Information Disclosure  Fixes 7 Vulnerabilities in IE 9 and 8 Vulnerabilities in IE 11: CVE-2020-1213, CVE-2020-1214, CVE-2020-1215, CVE-2020-1216, CVE-2020-1219, CVE-2020-1230, CVE-2020-1260, CVE-2020-1315  Restart Required: Requires browser restart  Known Issues: None reported
  • 21.
    Copyright©2019Ivanti.Allrightsreserved MS20-06-MR2K8-ESU: Monthly Rollupfor Windows Server 2008  Maximum Severity: Critical  Affected Products: Microsoft Windows Server 2008 and IE 9  Description: This security update includes improvements and fixes that were a part of update KB 4556860 (released May 12, 2020). Bulletin is based on KB 4561670. Security updates to Windows App Platform and Frameworks, Windows Kernel, Microsoft Graphics Component, Windows Input and Composition, Windows Media, Windows Cloud Infrastructure, Windows Peripherals, Windows File Server and Clustering, Windows Hybrid Storage Services, the Microsoft Scripting Engine, and the Microsoft JET Database Engine.  Impact: Remote Code Execution, Denial of Service, Elevation of Privilege, and Information Disclosure  Fixes 26 + 7 (IE 9) Vulnerabilities: No CVEs are publicly disclosed or known exploited. See the Security Update Guide for the complete list of CVEs.  Restart Required: Requires restart  Known Issues: [ESU Fail] See next slide.
  • 22.
    Copyright©2019Ivanti.Allrightsreserved June Known Issuesfor Server 2008  KB 4561670 – Windows Server 2008 (Monthly Rollup)  [ESU Fail] After installing this update and restarting your device, you might receive the error, “Failure to configure Windows updates. Reverting Changes. Do not turn off your computer”, and the update might show as Failed in Update History. Workaround: This is expected in the following circumstances: • If you are installing this update on a device that is running an edition that is not supported for ESU. For a complete list of which editions are supported, see KB 4497181. • If you do not have an ESU MAK add-on key installed and activated. If you have purchased an ESU key and have encountered this issue, please verify you have applied all prerequisites and that your key is activated.  https://support.microsoft.com/en-us/help/4522133/procedure-to-continue-receiving-security- updates  KB 4561645 – Windows Server 2008 (Security-only Update)
  • 23.
    Copyright©2019Ivanti.Allrightsreserved MS20-06-SO2K8-ESU: Security-only Updatefor Windows Server 2008  Maximum Severity: Critical  Affected Products: Microsoft Windows Server 2008  Description: This bulletin is based on KB 4561645. Security updates to Windows App Platform and Frameworks, Windows Kernel, Microsoft Graphics Component, Windows Input and Composition, Windows Media, Windows Cloud Infrastructure, Windows Peripherals, Windows File Server and Clustering, Windows Hybrid Storage Services, and the Microsoft JET Database Engine.  Impact: Remote Code Execution, Denial of Service, Elevation of Privilege, and Information Disclosure  Fixes 26 Vulnerabilities: No CVEs are publicly disclosed or known exploited. See the Security Update Guide for the complete list of CVEs.  Restart Required: Requires restart  Known Issues: [ESU Fail]
  • 24.
    Copyright©2019Ivanti.Allrightsreserved MS20-06-MR7-ESU: Monthly Rollupfor Win 7 MS20-06-MR2K8R2-ESU Monthly Rollup for Server 2008 R2  Maximum Severity: Critical  Affected Products: Microsoft Windows 7, Server 2008 R2, and IE  Description: This security update includes improvements and fixes that were a part of update KB 4556836 (released May 12, 2020). Bulletin is based on KB 4561643. Security updates to Windows App Platform and Frameworks, Windows Kernel, Microsoft Graphics Component, Windows Input and Composition, Windows Media, Windows Shell, Windows Cloud Infrastructure, Windows Fundamentals, Windows Storage and Filesystems, Windows File Server and Clustering, Windows Hybrid Storage Services, the Microsoft Scripting Engine, and the Microsoft JET Database Engine.  Impact: Remote Code Execution, Denial of Service, Elevation of Privilege, and Information Disclosure  Fixes 30 + 8 IE Vulnerabilities: No CVEs are publicly disclosed or known exploited. See the Security Update Guide for the complete list of CVEs.  Restart Required: Requires restart  Known Issues: [ESU Fail]
  • 25.
    Copyright©2019Ivanti.Allrightsreserved MS20-06-SO7-ESU: Security-only Updatefor Win 7 MS20-06-SO2K8R2-ESU: Security-only Update for Server 2008 R2  Maximum Severity: Critical  Affected Products: Microsoft Windows 7 SP1, Server 2008 R2 SP1  Description: Bulletin is based on KB 4561669. Security updates to Windows App Platform and Frameworks, Windows Kernel, Microsoft Graphics Component, Windows Input and Composition, Windows Media, Windows Shell, Windows Cloud Infrastructure, Windows Fundamentals, Windows Storage and Filesystems, Windows File Server and Clustering, Windows Hybrid Storage Services, and the Microsoft JET Database Engine.  Impact: Remote Code Execution, Denial of Service, Elevation of Privilege, and Information Disclosure  Fixes 30 Vulnerabilities: No CVEs are publicly disclosed or known exploited. See the Security Update Guide for the complete list of CVEs.  Restart Required: Requires restart  Known Issues: [ESU Fail]
  • 26.
    Copyright©2019Ivanti.Allrightsreserved MS20-06-MR8: Monthly Rollupfor Server 2012  Maximum Severity: Critical  Affected Products: Microsoft Server 2012 and IE  Description: This security update includes improvements and fixes that were a part of update KB 4556840 (released May 12, 2020). Bulletin is based on KB 4561612. Security updates to Windows App Platform and Frameworks, Windows Kernel, Microsoft Graphics Component, Windows Input and Composition, Windows Media, Windows Shell, Windows Cloud Infrastructure, Windows Fundamentals, Windows Peripherals, Windows File Server and Clustering, Windows Hybrid Storage Services, the Microsoft Scripting Engine, and the Microsoft JET Database Engine.  Impact: Remote Code Execution, Denial of Service, Elevation of Privilege, and Information Disclosure  Fixes 36 + 8 IE Vulnerabilities: No CVEs are publicly disclosed or known exploited. See the Security Update Guide for the complete list of CVEs.  Restart Required: Requires restart  Known Issues: None reported
  • 27.
    Copyright©2019Ivanti.Allrightsreserved MS20-06-SO8: Security-only Updatefor Server 2012  Maximum Severity: Critical  Affected Products: Microsoft Server 2012  Description: Bulletin is based on KB 4561674. Security updates to Windows App Platform and Frameworks, Windows Kernel, Microsoft Graphics Component, Windows Input and Composition, Windows Media, Windows Shell, Windows Cloud Infrastructure, Windows Fundamentals, Windows Peripherals, Windows File Server and Clustering, Windows Hybrid Storage Services, and the Microsoft JET Database Engine.  Impact: Remote Code Execution, Denial of Service, Elevation of Privilege, and Information Disclosure  Fixes 36 Vulnerabilities: No CVEs are publicly disclosed or known exploited. See the Security Update Guide for the complete list of CVEs.  Restart Required: Requires restart  Known Issues: None reported
  • 28.
    Copyright©2019Ivanti.Allrightsreserved MS20-06-MR81: Monthly Rollupfor Win 8.1 and Server 2012 R2  Maximum Severity: Critical  Affected Products: Microsoft Windows 8.1, Server 2012 R2, and IE  Description: This security update includes improvements and fixes that were a part of update KB 4556846 (released May 12, 2020). Bulletin is based on KB 4561666. Security updates to Internet Explorer, the Microsoft Scripting Engine, Windows App Platform and Frameworks, Windows Input and Composition, Windows Media, Windows Kernel, Windows Core Networking, Internet Information Services, Windows Network Security and Containers, Windows Active Directory, the Microsoft JET Database Engine, and Windows Storage and Filesystems.  Impact: Remote Code Execution, Denial of Service, Elevation of Privilege, and Information Disclosure  Fixes 37 + 8 IE Vulnerabilities: No CVEs are publicly disclosed or known exploited. See the Security Update Guide for the complete list of CVEs.  Restart Required: Requires restart  Known Issues: None reported
  • 29.
    Copyright©2019Ivanti.Allrightsreserved MS20-06-SO81: Security-only Updatefor Win 8.1 and Server 2012 R2  Maximum Severity: Critical  Affected Products: Microsoft Windows 8.1, Server 2012 R2  Description: Bulletin is based on KB 4561673. Security updates to Windows App Platform and Frameworks, Windows Kernel, Microsoft Graphics Component, Windows Input and Composition, Windows Media, Windows Shell, Windows Cloud Infrastructure, Windows Fundamentals, Windows File Server and Clustering, Windows Hybrid Storage Services, and the Microsoft JET Database Engine.  Impact: Remote Code Execution, Denial of Service, Elevation of Privilege, and Information Disclosure  Fixes 37 Vulnerabilities: No CVEs are publicly disclosed or known exploited. See the Security Update Guide for the complete list of CVEs.  Restart Required: Requires restart  Known Issues: None reported
  • 30.
    Copyright©2019Ivanti.Allrightsreserved MS20-06-SPT: Security Updatesfor SharePoint Server  Maximum Severity: Critical  Affected Products: Microsoft SharePoint Enterprise Server 2013 & 2016, Microsoft SharePoint Foundation Server 2010 & 2013, and Microsoft SharePoint Server 2010 & 2019  Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. This bulletin is based on 6 KB articles.  Impact: Remote Code Execution, Spoofing, and Elevation of Privilege  Fixes 12 Vulnerabilities: No CVEs are publicly disclosed or known exploited. See the Security Update Guide for the complete list of CVEs.  Restart Required: Requires Restart  Known Issues: None reported
  • 31.
    Copyright©2019Ivanti.Allrightsreserved MS20-06-OFF: Security Updatesfor Microsoft Office  Maximum Severity: Important  Affected Products: Excel 2010-2016, Office 2010-2016, Project 2010-2016, Word 2010-2016 + Word for Android, Office 2016 and 2019 for Mac  Description: This security update resolves a security feature bypass vulnerability that exists if Microsoft Outlook or another relevant product does not enforce security settings that are configured on a system. This security update also resolves a memory vulnerability in Microsoft Excel which could be exploited to run malicious as the active user. This security update resolves an information disclosure vulnerability that exists if Microsoft Project software reads out-of-bound memory because of an uninitialized variable. This bulletin references 7 KB articles plus release notes for MacOS.  Impact: Remote Code Execution, Security Feature Bypass, and Information Disclosure  Fixes 6 Vulnerabilities: CVE-2020-1223, CVE-2020-1225, CVE-2020-1226, CVE-2020-1229, CVE-2020-1321, CVE-2020-1322  Restart Required: Requires application restart  Known Issues: None reported
  • 32.
    Copyright©2019Ivanti.Allrightsreserved MS20-06-O365: Security UpdatesMicrosoft 365 Apps and Office 2019  Maximum Severity: Important  Affected Products: Microsoft 365 Apps, Office 2019  Description: This month’s update resolved various bugs and performance issues in Microsoft 365 Apps and Office 2019 applications. Information on Microsoft 365 Apps security updates is available at https://docs.microsoft.com/en- us/officeupdates/microsoft365-apps-security-updates.  Impact: Remote Code Execution, Security Feature Bypass, and Information Disclosure  Fixes 5 Vulnerabilities: CVE-2020-1225, CVE-2020-1226, CVE-2020-1229, CVE- 2020-1321, CVE-2020-1322  Restart Required: Requires application restart  Known Issues: None reported Note: Office 365 ProPlus has been renamed Microsoft 365 Apps for Enterprise!
  • 33.
    Copyright©2019Ivanti.Allrightsreserved Between Patch Tuesday’s NewProduct Support: Plantronics Hub Security Updates: Adobe Acrobat (2), Box Edit (1), Camtasia (1), CCleaner (1), Crowdstrike Falcon Sensor (1), Citrix Workspace App (2), Dropbox (2), Firefox (2), Firefox ESR (1), FileZilla (1), GoodSync (4), Google Chrome (2), Google Earth Pro (1), GIT for Windows (1), iCloud (1), iTunes (1), LibreOffice (1), LogMeIn (1), Microsoft (5), Nitro Pro (2), Node.JS (5), Opera (2), Oracle Virtualbox (4), PowerBI Desktop (2), Paint.net (1), Plex Media Player (2), Plex Media Server (4), PeaZip (2), Skype (1), Slack Machine-Wide Installer (1), Splunk Forwarder (1), Tableau Desktop (8), Tableau Reader (1), Thunderbird (2), Tomcat (1), TortoiseSVN (1), TeamViewer (2), VMware Workstation (2), Visual Studio Code (1), WinSCP (1), Wireshark (3), Zoom Client (3), Zoom Outlook Plugin (1) Non-Security Updates: Audacity (1), BlueJeans (2), Box Drive (1), Box Sync (1), CutePDF (1), Google Drive (1), GOM Player (1), Microsoft (25), Plantronics Hub (1), R for Windows (1), RealVNC Server (1), WebEx Teams (2), XnView (1)
  • 34.
    Copyright©2019Ivanti.Allrightsreserved Third Party CVEInformation  Apple iCloud 7.19.0.10  ICLOUD-200527, QICLOUD719010  Fixes 12 Vulnerabilities: CVE-2020-3878, CVE-2020-9789, CVE-2020-9790, CVE-2020-9794, CVE- 2020-9800, CVE-2020-9802, CVE-2020-9803, CVE-2020-9805, CVE-2020-9806, CVE-2020-9807, CVE- 2020-9843, CVE-2020-9850  Google Chrome 83.0.4103.61  CHROME-200519, QGC830410361  Fixes 27 Vulnerabilities: CVE-2020-6465, CVE-2020-6466, CVE-2020-6467, CVE-2020- 6468, CVE-2020-6469, CVE-2020-6470, CVE-2020-6471, CVE-2020-6472, CVE-2020- 6473, CVE-2020-6474, CVE-2020-6475, CVE-2020-6476, CVE-2020-6477, CVE-2020- 6478, CVE-2020-6479, CVE-2020-6480, CVE-2020-6481, CVE-2020-6482, CVE-2020- 6483, CVE-2020-6484, CVE-2020-6485, CVE-2020-6486, CVE-2020-6487, CVE-2020- 6488, CVE-2020-6489, CVE-2020-6490, CVE-2020-6491  Google Chrome 83.0.4103.97  CHROME-200603, QGC830410397  Fixes 6 Vulnerabilities: CVE-2020-6493, CVE-2020-6494, CVE-2020-6495, CVE-2020- 6496, CVE-2020-6497, CVE-2020-6498
  • 35.
    Copyright©2019Ivanti.Allrightsreserved Third Party CVEInformation (cont)  Firefox ESR 68.9.0  FFE-200602, QFFE6890  Fixes 2 Vulnerabilities: CVE-2020-12399,CVE-2020-12405  Firefox 77.0  FF-200602, QFF770  Fixes 7 Vulnerabilities: CVE-2020-12399, CVE-2020-12405, CVE-2020-12406, CVE- 2020-12407, CVE-2020-12408, CVE-2020-12409, CVE-2020-12411  iTunes 12.10.7.3  AI-200522, QAI121073  Fixes 12 Vulnerabilities: CVE-2020-3878, CVE-2020-9789, CVE-2020-9790, CVE- 2020-9794, CVE-2020-9800, CVE-2020-9802, CVE-2020-9803, CVE-2020-9805, CVE- 2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850  Microsoft Edge 83.0.478.45  MEDGE-200604, QMEDGE83047845  Fixes 4 Vulnerabilities: CVE-2020-6493, CVE-2020-6494, CVE-2020-6495, CVE- 2020-6496
  • 36.
    Copyright©2019Ivanti.Allrightsreserved Third Party CVEInformation (cont)  Node.JS 10.21.0 (LTS Lower)  NOJSLL-200602, QNODEJSLL10210  Fixes 3 Vulnerabilities: CVE-2020-8174,CVE-2020-10531,CVE-2020-11080  Node.JS 12.18.0 (LTS Upper)  NOJSLU-200602, QNODEJSLU12180  Fixes 3 Vulnerabilities: CVE-2020-8172, CVE-2020-8174, CVE-2020-11080  Node.JS 14.4.0 (Current)  NOJSC-200602, QNODEJSC1440  Fixes 3 Vulnerabilities: CVE-2020-8172, CVE-2020-8174, CVE-2020-11080  Thunderbird 68.9.0  TB-200604, QTB6890  Fixes 3 Vulnerabilities: CVE-2020-12399, CVE-2020-12405, CVE-2020- 12406, CVE-2020-12410
  • 37.
  • 38.

Editor's Notes

  • #9 https://www.rand.org/content/dam/rand/pubs/research_reports/RR1700/RR1751/RAND_RR1751.pdf https://enterprise.verizon.com/resources/reports/DBIR_2016_Report.pdf