Reports indicate that active exploitations against the vulnerability in Windows (CVE-2020-1464) for spoofing and the vulnerability in Internet Explorer (CVE-2020-1380) for remote code execution have been observed. System administrators are advised to take immediate action to patch your affected systems to mitigate the elevated risk of cyber attacks.
The proof-of-concept and workable exploit code against the elevation of privilege vulnerability (CVE-2020-1472) in Microsoft’s Netlogon has been publicly available on the Internet. The vulnerability affects Windows Server 2008 R2 and later. System administrators are advised to take immediate action to patch your affected systems to mitigate the elevated risk of cyber attacks.
Microsoft Internet Explorer 9, 11
Microsoft Edge (EdgeHTML-based)
Microsoft Windows 7, 8.1, RT 8.1, 10
Microsoft Windows Server 2008, 2008 R2, 2012, 2012 R2, 2016, 2019
Microsoft Windows Server, version 1903, version 1909, version 2004
Microsoft 365 Apps for Enterprise
Microsoft Office 2010, 2013, 2013 Click-to-Run, 2013 RT, 2016, 2016 for Mac, 2019, 2019 for Mac
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, elevation of privilege, denial of service, information disclosure and spoofing.
Patches for affected products are available from the Windows Update / Microsoft Update Catalog. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.