Reports indicate that active exploitation against the vulnerability in Microsoft Internet Explorer (CVE-2020-0674) for remote code execution have been observed. Users are advised to take immediate action to patch your affected systems to mitigate the elevated risk of cyber attacks.
Please note that Microsoft announced that the extended support for Windows 7 has been ceased since 14 January 2020 and no security updates will be provided after that. Users should arrange upgrading the Windows to Windows 10 or migrating to other supported technology.
Microsoft Internet Explorer 9, 10, 11
Microsoft Edge (EdgeHTML-based)
Microsoft Windows 7, 8.1, RT 8.1, 10
Microsoft Windows Server 2008, 2008 R2, 2012, 2012 R2, 2016, 2019
Microsoft Windows Server, version 1803, version 1903, version 1909
Microsoft Office 2016 for Mac, 2019, 2019 for Mac
Microsoft Office 365 ProPlus
Microsoft Office Online Server
Microsoft Excel 2010, 2013, 2013 RT, 2016
Microsoft Outlook 2010, 2013, 2013 RT, 2016
Microsoft Exchange Server 2010, 2013, 2016, 2019
Microsoft SQL Server 2012, 2014, 2016
Microsoft SharePoint Enterprise Server 2016
Microsoft SharePoint Server 2013, 2019
Microsoft Surface Hub
Windows Malicious Software Removal Tool
A complete list of the affected products can be found at: https://portal.msrc.microsoft.com/en-us/security-guidance
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, elevation of privilege, denial of service, information disclosure, security feature bypass, spoofing and tampering.
Patches for affected products are available from the Windows Update / Microsoft Update Catalog. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.