Reports indicate active exploitation against the vulnerabilities in Microsoft Windows and Windows Server (CVE-2019-0880 and CVE-2019-1132) for privilege escalation have been observed. Users are advised to take immediate action to patch your affected systems to mitigate the elevated risk of cyber attacks.
Microsoft Internet Explorer 9, 10, 11
Microsoft Windows 7, 8.1, RT 8.1, 10
Microsoft Windows Server 2008, 2008 R2, 2012, 2012 R2, 2016, 2019
Microsoft Windows Server, version 1803, version 1903
Microsoft Office 2010, 2013, 2013 RT, 2016, 2016 for Mac, 2019, 2019 for Mac
Microsoft Visual Studio 2010, 2012, 2013, 2015, 2017, 2019
Team Foundation Server 2010, 2012, 2013, 2015, 2017, 2018
Azure IoT Edge
Microsoft Azure Kubernetes Service
A complete list of the affected products can be found at: https://portal.msrc.microsoft.com/en-us/security-guidance
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, information disclosure, security feature bypass, elevation of privilege, spoofing and denial of service.
Patches for affected products are available from the Windows Update / Microsoft Update Catalog. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.