Microsoft today issued software updates to plug at least 111 security holes in Windows and Windows-based programs. None of the vulnerabilities were labeled as being publicly exploited or detailed prior to today, but as always if you’re running Windows on any of your machines it’s time once again to prepare to get your patches on.
May marks the third month in a row that Microsoft has pushed out fixes for more than 110 security flaws in its operating system and related software. At least 16 of the bugs are labeled “Critical,” meaning ne’er-do-wells can exploit them to install malware or seize remote control over vulnerable systems with little or no help from users.
But focusing solely on Microsoft’s severity ratings may obscure the seriousness of the flaws being addressed this month. Todd Schell, senior product manager at security vendor Ivanti, notes that if one looks at the “exploitability assessment” tied to each patch — i.e., how likely Microsoft considers each can and will be exploited for nefarious purposes — it makes sense to pay just as much attention to the vulnerabilities Microsoft has labeled with the lesser severity rating of “Important.”
Virtually all of the non-critical flaws in this month’s batch earned Microsoft’s “Important” rating.
“What is interesting and often overlooked is seven of the ten [fixes] at higher risk of exploit are only rated as Important,” Schell said. “It is not uncommon to look to the critical vulnerabilities as the most concerning, but many of the vulnerabilities that end up being exploited are rated as Important vs Critical.”
For example, Satnam Narang from Tenable notes that two remote code execution flaws in Microsoft Color Management (CVE-2020-1117) and Windows Media Foundation (CVE-2020-1126) could be exploited by tricking a user into opening a malicious email attachment or visiting a website that contains code designed to exploit the vulnerabilities. However, Microsoft rates these vulnerabilities as “Exploitation Less Likely,” according to their Exploitability Index.
In contrast, three elevation of privilege vulnerabilities that received a rating of “Exploitation More Likely” were also patched, Narang notes. These include a pair of “Important” flaws in Win32k (CVE-2020-1054, CVE-2020-1143) and one in the Windows Graphics Component (CVE-2020-1135). Elevation of Privilege vulnerabilities are used by attackers once they’ve managed to gain access to a system in order to execute code on their target systems with elevated privileges. There are at least 56 of these types of fixes in the May release.
Schell says if your organization’s plan for prioritizing the deployment of this month’s patches stops at vendor severity or even CVSS scores above a certain level you may want to reassess your metrics.
“Look to other risk metrics like Publicly Disclosed, Exploited (obviously), and Exploitability Assessment (Microsoft specific) to expand your prioritization process,” he advised.
As it usually does each month on Patch Tuesday, Adobe also has issued updates for some of its products. An update for Adobe Acrobat and Reader covers two dozen critical and important vulnerabilities. There are no security fixes for Adobe’s Flash Player in this month’s release.
Just a friendly reminder that while many of the vulnerabilities fixed in today’s Microsoft patch batch affect Windows 7 operating systems — including all three of the zero-day flaws — this OS is no longer being supported with security updates (unless you’re an enterprise taking advantage of Microsoft’s paid extended security updates program, which is available to Windows 7 Professional and Windows 7 enterprise users).
If you rely on Windows 7 for day-to-day use, it’s time to think about upgrading to something newer. That something might be a PC with Windows 10. Or maybe you have always wanted that shiny MacOS computer.
If cost is a primary motivator and the user you have in mind doesn’t do much with the system other than browsing the Web, perhaps a Chromebook or an older machine with a recent version of Linux is the answer (Ubuntu may be easiest for non-Linux natives). Whichever system you choose, it’s important to pick one that fits the owner’s needs and provides security updates on an ongoing basis.
Keep in mind that while staying up-to-date on Windows patches is a must, it’s important to make sure you’re updating only after you’ve backed up your important data and files. A reliable backup means you’re not losing your mind when the odd buggy patch causes problems booting the system.
So backup your files before installing any patches. Windows 10 even has some built-in tools to help you do that, either on a per-file/folder basis or by making a complete and bootable copy of your hard drive all at once.
And if you wish to ensure Windows has been set to pause updating so you can back up your files and/or system before the operating system decides to reboot and install patches on its own schedule, see this guide.
As always, if you experience glitches or problems installing any of these patches this month, please consider leaving a comment about it below; there’s a better-than-even chance other readers have experienced the same and may chime in here with some helpful tips. Also, keep an eye on the AskWoody blog from Woody Leonhard, who keeps a reliable lookout for buggy Microsoft updates each month.
Further reading:
SANS Internet Storm Center breakdown by vulnerability and severity
It’s not a security fix, but Flash has been updated to v32.0.0.371 (all flavors) and there is an updated uninstaller for it as well.
Hey, that would be fun, wouldn’t it, if miscreants could jack up your system from the Flash Uninstaller, hah?
It’s available directly from Adobe as an official product, so perhaps true IF you consider Adobe itself as one of those miscreants.
Don’t forget to mention the new featured update , “20-04” on May 24
The only reason I use Win 7 is for some things I have to use Windows.
Windows 10 is a surviellance nightmare. It actively tries to invade my privacy and will reconfigure itself, and I can’t even disable Cortana.
So either stay vulnerable or be privacy raped?
Or perhaps you could put together an article about how to disconnect the MicroSurveillence parts as well as the We will force you things?
I have Windows Tentacle on one small new computer because I needed a live system as a backup. It took 2+ hours to disable the crap configurations and enabled things it came with and it wasn’t the first computer I did.
Yep, I’m sorry to admit it but I’m with you on this one, buddy. And not just on the surveillance front, but also with these annoying forced updates that screw things up once in a while.
On a different front, try to count how many times did you get a virus due to not updating your system? Got the number, ok. Then count how many times your computer was screwed up because of an update? Got another number, right.
So the result will tell you what you should avoid doing.
“Keep in mind that while staying up-to-date on Windows patches is a must,”
This is clearly not a true statement. See tcw.org to see how to configure Win10 to work, kinda.
Me? I’ll stick with Win7, with updates shut off since 2014.
Hahaha wow…. Stay on Windows 7 – oh my are you living under a rock.
Are you brainwashed?
How it is that MS can’t make a secure OS? How many hundreds vulnerabilities will be patched? It is not the OS who protects you, but the antivirus+firewall+etc. protection+Web Browser protection+Knowledge. I’ve hardened some machine for friends with special requirements since WindowsXP and they didn’t get any virus or malware even though the WU are turned off. They do get some updates installed in time but not as MS wanted.
And let us not forget that every time I open up the monitor of my laptop that super annoying intrusive Edge pops up. I x out of it immediately, but it is still annoying.
I have tried some of the suggested solutions, but they either did not do the job or there was no such way to proceed. No, I do not feel confident enough to do regedit.
Go to your search bar. Type task manager. Click more detail. Go to startup and disable edge.
@tz
You have a brilliant mind.
Perhaps you can make use of this list of IP addresses to block so you can feel more comfortable. It’s a couple years old, so not sure if it’s still current/complete.
0.0.0.0 vortex.data.microsoft.com
0.0.0.0 vortex-win.data.microsoft.com
0.0.0.0 telecommand.telemetry.microsoft.com
0.0.0.0 telecommand.telemetry.microsoft.com.nsatc.net
0.0.0.0 oca.telemetry.microsoft.com
0.0.0.0 oca.telemetry.microsoft.com.nsatc.net
0.0.0.0 sqm.telemetry.microsoft.com
0.0.0.0 sqm.telemetry.microsoft.com.nsatc.net
0.0.0.0 watson.telemetry.microsoft.com
0.0.0.0 watson.telemetry.microsoft.com.nsatc.net
0.0.0.0 redir.metaservices.microsoft.com
0.0.0.0 choice.microsoft.com
0.0.0.0 choice.microsoft.com.nsatc.net
0.0.0.0 df.telemetry.microsoft.com
0.0.0.0 reports.wes.df.telemetry.microsoft.com
0.0.0.0 wes.df.telemetry.microsoft.com
0.0.0.0 services.wes.df.telemetry.microsoft.com
0.0.0.0 sqm.df.telemetry.microsoft.com
0.0.0.0 telemetry.microsoft.com
0.0.0.0 watson.ppe.telemetry.microsoft.com
0.0.0.0 telemetry.appex.bing.net
0.0.0.0 telemetry.urs.microsoft.com
0.0.0.0 urs.microsoft.com
0.0.0.0 bing.com
0.0.0.0 telemetry.appex.bing.net:443
0.0.0.0 settings-sandbox.data.microsoft.com
0.0.0.0 vortex-sandbox.data.microsoft.com
0.0.0.0 survey.watson.microsoft.com
0.0.0.0 watson.live.com
0.0.0.0 watson.microsoft.com
0.0.0.0 statsfe2.ws.microsoft.com
0.0.0.0 corpext.msitadfs.glbdns2.microsoft.com
0.0.0.0 compatexchange.cloudapp.net
0.0.0.0 cs1.wpc.v0cdn.net
0.0.0.0 a-0001.a-msedge.net
0.0.0.0 statsfe2.update.microsoft.com.akadns.net
0.0.0.0 sls.update.microsoft.com.akadns.net
0.0.0.0 fe2.update.microsoft.com.akadns.net
0.0.0.0 diagnostics.support.microsoft.com
0.0.0.0 corp.sts.microsoft.com
0.0.0.0 statsfe1.ws.microsoft.com
0.0.0.0 pre.footprintpredict.com
0.0.0.0 i1.services.social.microsoft.com
0.0.0.0 i1.services.social.microsoft.com.nsatc.net
0.0.0.0 feedback.windows.com
0.0.0.0 feedback.microsoft-hohm.com
0.0.0.0 feedback.search.microsoft.com
0.0.0.0 public-family.api.account.microsoft.com
0.0.0.0 adnxs.com
0.0.0.0 c.msn.com
0.0.0.0 g.msn.com
0.0.0.0 h1.msn.com
0.0.0.0 msedge.net
0.0.0.0 rad.msn.com
0.0.0.0 ads.msn.com
0.0.0.0 adnexus.net
0.0.0.0 ac3.msn.com
0.0.0.0 c.atdmt.com
0.0.0.0 m.adnxs.com
0.0.0.0 sO.2mdn.net
0.0.0.0 ads1.msn.com
0.0.0.0 ec.atdmt.com
0.0.0.0 flex.msn.com
0.0.0.0 rad.live.com
0.0.0.0 ui.skype.com
0.0.0.0 msftncsi.com
0.0.0.0 a-msedge.net
0.0.0.0 a.rad.msn.com
0.0.0.0 b.rad.msn.com
0.0.0.0 cdn.atdmt.com
0.0.0.0 m.hotmail.com
0.0.0.0 ads1.msads.net
0.0.0.0 a.ads1.msn.com
0.0.0.0 a.ads2.msn.com
0.0.0.0 apps.skype.com
0.0.0.0 b.ads1.msn.com
0.0.0.0 view.atdmt.com
0.0.0.0 preview.msn.com
0.0.0.0 aidps.atdmt.com
0.0.0.0 static.2mdn.net
0.0.0.0 a.ads2.msads.net
0.0.0.0 b.ads2.msads.net
0.0.0.0 db3aqu.atdmt.com
0.0.0.0 secure.adnxs.com
0.0.0.0 http://www.msftncsi.com
0.0.0.0 live.rads.msn.com
0.0.0.0 ad.doubleclick.net
0.0.0.0 bs.serving-sys.com
0.0.0.0 pricelist.skype.com
0.0.0.0 a-0002.a-msedge.net
0.0.0.0 a-0003.a-msedge.net
0.0.0.0 a-0004.a-msedge.net
0.0.0.0 a-0005.a-msedge.net
0.0.0.0 a-0006.a-msedge.net
0.0.0.0 a-0007.a-msedge.net
0.0.0.0 a-0008.a-msedge.net
0.0.0.0 a-0009.a-msedge.net
0.0.0.0 aka-cdn-ns.adtech.de
0.0.0.0 cds26.ams9.msecn.net
0.0.0.0 lb1.www.ms.akadns.net
0.0.0.0 az361816.vo.msecnd.net
0.0.0.0 az512334.vo.msecnd.net
0.0.0.0 msntest.serving-sys.com
0.0.0.0 secure.flashtalking.com
0.0.0.0 s.gateway.messenger.live.com
0.0.0.0 schemas.microsoft.akadns.net
0.0.0.0 settings-win.data.microsoft.com
0.0.0.0 msnbot-65-55-108-23.search.msn.com
0.0.0.0 vortex-bn2.metron.live.com.nsatc.net
0.0.0.0 vortex-cy2.metron.live.com.nsatc.net
0.0.0.0 http://www.vortex.data.microsoft.com
0.0.0.0 http://www.vortex-win.data.microsoft.com
0.0.0.0 http://www.telecommand.telemetry.microsoft.com
0.0.0.0 http://www.telecommand.telemetry.microsoft.com.nsatc.net
0.0.0.0 http://www.oca.telemetry.microsoft.com
0.0.0.0 http://www.oca.telemetry.microsoft.com.nsatc.net
0.0.0.0 http://www.sqm.telemetry.microsoft.com
0.0.0.0 http://www.sqm.telemetry.microsoft.com.nsatc.net
0.0.0.0 http://www.watson.telemetry.microsoft.com
0.0.0.0 http://www.watson.telemetry.microsoft.com.nsatc.net
0.0.0.0 http://www.redir.metaservices.microsoft.com
0.0.0.0 http://www.choice.microsoft.com
0.0.0.0 http://www.choice.microsoft.com.nsatc.net
0.0.0.0 http://www.df.telemetry.microsoft.com
0.0.0.0 http://www.reports.wes.df.telemetry.microsoft.com
0.0.0.0 http://www.wes.df.telemetry.microsoft.com
0.0.0.0 http://www.services.wes.df.telemetry.microsoft.com
0.0.0.0 http://www.sqm.df.telemetry.microsoft.com
0.0.0.0 http://www.telemetry.microsoft.com
0.0.0.0 http://www.watson.ppe.telemetry.microsoft.com
0.0.0.0 http://www.telemetry.appex.bing.net
0.0.0.0 http://www.telemetry.urs.microsoft.com
0.0.0.0 http://www.urs.microsoft.com
0.0.0.0 http://www.bing.com
0.0.0.0 http://www.telemetry.appex.bing.net:443
0.0.0.0 http://www.settings-sandbox.data.microsoft.com
0.0.0.0 http://www.vortex-sandbox.data.microsoft.com
0.0.0.0 http://www.survey.watson.microsoft.com
0.0.0.0 http://www.watson.live.com
0.0.0.0 http://www.watson.microsoft.com
0.0.0.0 http://www.statsfe2.ws.microsoft.com
0.0.0.0 http://www.corpext.msitadfs.glbdns2.microsoft.com
0.0.0.0 http://www.compatexchange.cloudapp.net
0.0.0.0 http://www.cs1.wpc.v0cdn.net
0.0.0.0 http://www.a-0001.a-msedge.net
0.0.0.0 http://www.statsfe2.update.microsoft.com.akadns.net
0.0.0.0 http://www.sls.update.microsoft.com.akadns.net
0.0.0.0 http://www.fe2.update.microsoft.com.akadns.net
0.0.0.0 http://www.diagnostics.support.microsoft.com
0.0.0.0 http://www.corp.sts.microsoft.com
0.0.0.0 http://www.statsfe1.ws.microsoft.com
0.0.0.0 http://www.pre.footprintpredict.com
0.0.0.0 http://www.i1.services.social.microsoft.com
0.0.0.0 http://www.i1.services.social.microsoft.com.nsatc.net
0.0.0.0 http://www.feedback.windows.com
0.0.0.0 http://www.feedback.microsoft-hohm.com
0.0.0.0 http://www.feedback.search.microsoft.com
0.0.0.0 http://www.public-family.api.account.microsoft.com
0.0.0.0 http://www.adnxs.com
0.0.0.0 http://www.c.msn.com
0.0.0.0 http://www.g.msn.com
0.0.0.0 http://www.h1.msn.com
0.0.0.0 http://www.msedge.net
0.0.0.0 http://www.rad.msn.com
0.0.0.0 http://www.ads.msn.com
0.0.0.0 http://www.adnexus.net
0.0.0.0 http://www.ac3.msn.com
0.0.0.0 http://www.c.atdmt.com
0.0.0.0 http://www.m.adnxs.com
0.0.0.0 http://www.sO.2mdn.net
0.0.0.0 http://www.ads1.msn.com
0.0.0.0 http://www.ec.atdmt.com
0.0.0.0 http://www.flex.msn.com
0.0.0.0 http://www.rad.live.com
0.0.0.0 http://www.ui.skype.com
0.0.0.0 http://www.msftncsi.com
0.0.0.0 http://www.a-msedge.net
0.0.0.0 http://www.a.rad.msn.com
0.0.0.0 http://www.b.rad.msn.com
0.0.0.0 http://www.cdn.atdmt.com
0.0.0.0 http://www.m.hotmail.com
0.0.0.0 http://www.ads1.msads.net
0.0.0.0 http://www.a.ads1.msn.com
0.0.0.0 http://www.a.ads2.msn.com
0.0.0.0 http://www.apps.skype.com
0.0.0.0 http://www.b.ads1.msn.com
0.0.0.0 http://www.view.atdmt.com
0.0.0.0 http://www.preview.msn.com
0.0.0.0 http://www.aidps.atdmt.com
0.0.0.0 http://www.static.2mdn.net
0.0.0.0 http://www.a.ads2.msads.net
0.0.0.0 http://www.b.ads2.msads.net
0.0.0.0 http://www.db3aqu.atdmt.com
0.0.0.0 http://www.secure.adnxs.com
0.0.0.0 http://www.www.msftncsi.com
0.0.0.0 http://www.live.rads.msn.com
0.0.0.0 http://www.ad.doubleclick.net
0.0.0.0 http://www.bs.serving-sys.com
0.0.0.0 http://www.pricelist.skype.com
0.0.0.0 http://www.a-0002.a-msedge.net
0.0.0.0 http://www.a-0003.a-msedge.net
0.0.0.0 http://www.a-0004.a-msedge.net
0.0.0.0 http://www.a-0005.a-msedge.net
0.0.0.0 http://www.a-0006.a-msedge.net
0.0.0.0 http://www.a-0007.a-msedge.net
0.0.0.0 http://www.a-0008.a-msedge.net
0.0.0.0 http://www.a-0009.a-msedge.net
0.0.0.0 http://www.aka-cdn-ns.adtech.de
0.0.0.0 http://www.cds26.ams9.msecn.net
0.0.0.0 http://www.lb1.www.ms.akadns.net
0.0.0.0 http://www.az361816.vo.msecnd.net
0.0.0.0 http://www.az512334.vo.msecnd.net
0.0.0.0 http://www.msntest.serving-sys.com
0.0.0.0 http://www.secure.flashtalking.com
0.0.0.0 http://www.s.gateway.messenger.live.com
0.0.0.0 http://www.schemas.microsoft.akadns.net
0.0.0.0 http://www.settings-win.data.microsoft.com
0.0.0.0 http://www.msnbot-65-55-108-23.search.msn.com
0.0.0.0 http://www.vortex-bn2.metron.live.com.nsatc.net
0.0.0.0 http://www.vortex-cy2.metron.live.com.nsatc.net
Or better yet get a pihole and get a couple dozen lists, and add a script to update them daily/weekly.
Cortana is actually on its way out.
https://thenextweb.com/microsoft/2019/01/17/windows-10s-search-bar-and-cortana-split-up-on-good-terms/
https://thenextweb.com/microsoft/2019/11/18/microsoft-cortana-app/
Windows patches don’t do anything use service pack 1 with no updates it’s better to use Linux as much as possible. if your addicted to facebook,insta,goog,amaz,uber and the rest… your mileage may very.
It does not really matter which os you run, just keep it up 2 patch.
Linux and mac also contain vulnerabilities as well as the software running on top of the os.
Given that they’re all bundled into a single cumulative update, it’s unlikely anyone is going to do anything other than install all the updates in one shot, rather than deconstruct it to deploy only Critical severity updates.
So what exactly can’t HOME users do with a Chromebook? Almost every time an expert mentions a Chromebook, it’s usually in a subtle(or not so) derogatory fashion. I’ve been using one since 2012 & wouldn’t go back to Windoze. I read some tech folks say you can’t do “real” work with them. Just email & lite browsing.
FWIW, there are 3 guys I listen to that have a radio call in on Saturdays(Sound Bytes) that have been involved in the industry for decades so they know their stuff. Two of the 3 have Chromebooks & love em. They say they can do almost everything they need. The 3rd is mostly a Mac guy who likes Chromebooks, but hasn’t got one yet.
Can’t install favourite Windows software. Genealogy, image editing, scanning, etc.
You forgot the big one, you cannot save locally. It is web based. Being web based, you have difficulty’s when your local web connection goes down.
I use chromebook with a monitor for everything. But you cant attach a wired printer nor add photoshop. Ugh. That’s only 2 times I go on my laptop on windows. I agree though, I began using chromebook because I didnt want virus risks. I have 4 extensions that I put on laptop that are automatically then configured to my chromebook. Like Gramarly, An app to keep screen lit up when not active (for crochet patterns), etc. I can do most things on chromebook. I even connected wireless earbuds last week as my chrome book has bluetooth. I feel safer.ibdo turn on and run updates on windows 10 laptop weekly & bitdefender, etc but don’t let it sync to other devices in case it messes up. I love my laptop but had onevyrs ago, got a virus and vowed to not be so vulnerable again. Great minds think alike. 4 yrs now no issues. My monitor connected to chromebook is big so I dont notice I’m using a tiny chromebook anyway!
Latest updates in my windows 10 v 1803 must do it with command prompt dism online and get package of the cab file
Except that Chromebooks are from the very heart of the dark side, even darker than Redmond, Google, the single worst privacy violators extant!
+1 to you sir!
It doesn’t cost all that much to keep Windows 7 patched, and in fact the utility I was introduced to by a fellow KOS reader, does a better job also patching ALL of my apps including ones I forgot I had. I just couldn’t afford a new computer, and Win 10 is incompatible with my old PC – God knows I tried to install it. – so I will gladly pay $25 or so bucks a year to keep my machine patched with micro patches from Opatch
I am not a shill for them, I just want folks to know there are alternatives out there. My machine is running better now, than I ever remembered before January 14, 2020. Despite catching, and/or blocking a few malware packages since then, I’ve not been aware that my system has been compromised yet. So far they’ve been swatted down, and removed with no evident pwning of vulnerabilities. And BTW, I don’t have to reboot, and never have had a problem with any of these patches; which is more than I can say with the ones from Microsoft in the past!
Personally I don’t care very much about Linux operating systems (yes I know I will get hate from the Linux fans). Of course I have to work with Linux when I setup routers. I think there is a big difference between the typical Linux OS and Linux developed by a major corporation like the Z OS used on IBM mainframes for banking. I need either Windows or MacOS for editing photos in Lightroom and Photoshop. But I do use my Chromebook a lot on the internet. It is probably a little difficult to attack the Chrome OS especially when using the guest account. And if somebody does attack it-just ‘powerwash’ it and keep right on going.
if you believe you simply must check some pdf or other file you received in an email, have a paid email account and a chromebook. Sent the pdf to the email account and open up the file using the guest account on the chromebook. Not a lot of malware can affect an up to date chromebook. If you need to check out a website you have never been before, check it out with the chromebook first. I go to many of my website like news sites all the time using my chromebook. Even if the worst happened and malware could damage the chromebook, you can simply rerset the chromebook or get a new chromebook. And at leasr malware will not be on your Windows or Apple computers.
The motherboard on HP Biz?Windows 7 tower went haywire, so I bought a locally assembled tower with Windows 10 installed, and Ubuntu 20.04 as the primary (partitioned) OS. At the moment, I’m using Windows for printing and storage of my own photos. All browsers except Chrome deleted or disabled. It came with AVG free, which self-updates. I have the updates postponed until the 30th of the month. Question: is it still possible–and a good idea–to create a user account, and a separate Admin account for Windows?
Geez another update what they mess up this time?! , im getting hate Microsoft because that april update ruined my system, and must send my laptop to service man for repairs.
Yeah, you better check askwoody.com before installing ANY update or patch; this month’s .NET patch can wreck your ESU license, among other unpleasantness.
Patched and updated. No problems.
The real story is that this “zero day” flaw was covered up by Microsoft, as they and the NSA used it to capture all of the data of all Americans forced home because of the corona pandemic. Perfect time to stress test and capture base data for algorithm training their new cloud AI for the military. And they can power on your wireless card, reflash its firmware. Dig into your windows tasks and privs and settings. Also, government just made it legal for fbi to view your internet history without a warrant. All on Tuesday
Wow, great article. Thanks for that! Keep up the great writing! pyramids