logo_SVG-01
✕
  • Platform
    • Rewterz XDR
    • Rewterz Defense
    • Rewterz Threat Intelligence
    • Managed Security Services
    • Managed Penetration Testing
  • Services
    • Assess
      • Compromise Assessment
      • Advanced Persistent Threats Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      • SOC Maturity Assessment
      • SOC Model Evaluation
      • SOC Gap Analysis
      • SIEM Gap Analysis
      • SIEM Optimization
      • SOC Content Pack
    • Train
      • Simulated Cyber Attack Exercise
      • Tabletop Exercise
      • Security Awareness and Training
    • Respond
      • Incident Analysis
      • Incident Response
  • Solutions
  • Resources
    • Blogs
    • Press Releases
    • Threat Insights
      • Threat Intelligence Reports
      • Threat Advisories
      • Monthly Threat Insights
  • Why Rewterz?
    • About Us
    • Careers
    • Contact
logo_SVG-01
  • Platform
    xdrLogo
    center_new
    Read More about XDR

    Platform

    • Rewterz XDR
    • Rewterz Defense
    • Rewterz Threat Intelligence
    Rewterz Threat Advisory – Microsoft Windows Server 2016 / Windows 10 Multiple Vulnerabilities

    Managed Security Services

    • Managed Security Monitoring
    • Remote SOC
    • Onsite SOC
    • Hybrid SOC

    Managed Penetration Testing

    Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.

  • Services

    Assess

    • Compromise Assessment
    • APT Assessment
    • Penetration Testing
    • Architecture Design & Review
    • Red Team Assessment
    • Purple Team Assessment
    • Social Engineering
    • Source Code Review

    Transform

    • SOC Consultancy
    • SOC Maturity Assessment
    • SOC Model Evaluation
    • SOC Gap Analysis
    • SIEM Gap Analysis
    • SIEM Optimization
    • SOC Content Pack

    Train

    • Simulated Cyber Attack Exercise
    • Tabletop Exercise
    • Security Awareness and Training

    Respond

    • Incident Analysis
    • Incident Response
  • Solutions
  • Resources

    Resources

    • Blog
    • Press Releases
    March 25, 2023
    March 25, 2023
    Rewterz Threat Alert – GandCrab or .CRAB Ransomware – Active IOCs
    Severity Medium Analysis Summary GandCrab – a ransomware-as-a-service variant – was discovered in early 2018. At least five versions of GandCrab have been created since its […]
    March 25, 2023
    March 25, 2023
    Rewterz Threat Alert – NJRAT – Active IOCs
    Severity Medium Analysis Summary NjRat is a Remote Access Trojan, which is found leveraging Pastebin to deliver a second-stage payload after initial infection. There are multiple […]
    March 24, 2023
    March 24, 2023
    Rewterz Threat Advisory – CVE-2023-20113 – Cisco SD-WAN vManage Software Vulnerability
    Severity Medium Analysis Summary CVE-2023-20113  Cisco SD-WAN vManage Software is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By persuading an authenticated […]

    Threat Insights

    16
    pdf-file (1)
    Annual Threat Intelligence Report 2022
    • Threat Advisories
    • Monthly Threat Insights
    • Threat Intelligence Reports
  • Why Rewterz?

    About Us

    Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.

    Read More

    play_btn_Smallplay_btn_hover_Small
    leadership

    Our Leadership

    Our leadership team brings together years of knowledge and experience in cybersecurity to drive our company's mission and vision. Our team is passionate about delivering high-quality products and services, leading by example and assisting our clients in securing their organization’s environment.
    help

    CSR

    At Rewterz, we believe that businesses have a responsibility to impact positively and contribute to the well-being of our communities as well as the planet. That's why we are committed to operating in a socially responsible and sustainable way.

    Connect with Us

    • Contact
    • Careers
Get in Touch
logo_SVG-01
  • Platform
    xdrLogo
    center_new
    Read More about XDR

    Platform

    • Rewterz XDR
    • Rewterz Defense
    • Rewterz Threat Intelligence
    Rewterz Threat Advisory – Microsoft Windows Server 2016 / Windows 10 Multiple Vulnerabilities

    Managed Security Services

    • Managed Security Monitoring
    • Remote SOC
    • Onsite SOC
    • Hybrid SOC

    Managed Penetration Testing

    Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.

  • Services

    Assess

    • Compromise Assessment
    • APT Assessment
    • Penetration Testing
    • Architecture Design & Review
    • Red Team Assessment
    • Purple Team Assessment
    • Social Engineering
    • Source Code Review

    Transform

    • SOC Consultancy
    • SOC Maturity Assessment
    • SOC Model Evaluation
    • SOC Gap Analysis
    • SIEM Gap Analysis
    • SIEM Optimization
    • SOC Content Pack

    Train

    • Simulated Cyber Attack Exercise
    • Tabletop Exercise
    • Security Awareness and Training

    Respond

    • Incident Analysis
    • Incident Response
  • Solutions
  • Resources

    Resources

    • Blog
    • Press Releases
    March 25, 2023
    March 25, 2023
    Rewterz Threat Alert – GandCrab or .CRAB Ransomware – Active IOCs
    Severity Medium Analysis Summary GandCrab – a ransomware-as-a-service variant – was discovered in early 2018. At least five versions of GandCrab have been created since its […]
    March 25, 2023
    March 25, 2023
    Rewterz Threat Alert – NJRAT – Active IOCs
    Severity Medium Analysis Summary NjRat is a Remote Access Trojan, which is found leveraging Pastebin to deliver a second-stage payload after initial infection. There are multiple […]
    March 24, 2023
    March 24, 2023
    Rewterz Threat Advisory – CVE-2023-20113 – Cisco SD-WAN vManage Software Vulnerability
    Severity Medium Analysis Summary CVE-2023-20113  Cisco SD-WAN vManage Software is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By persuading an authenticated […]

    Threat Insights

    16
    pdf-file (1)
    Annual Threat Intelligence Report 2022
    • Threat Advisories
    • Monthly Threat Insights
    • Threat Intelligence Reports
  • Why Rewterz?

    About Us

    Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.

    Read More

    play_btn_Smallplay_btn_hover_Small
    leadership

    Our Leadership

    Our leadership team brings together years of knowledge and experience in cybersecurity to drive our company's mission and vision. Our team is passionate about delivering high-quality products and services, leading by example and assisting our clients in securing their organization’s environment.
    help

    CSR

    At Rewterz, we believe that businesses have a responsibility to impact positively and contribute to the well-being of our communities as well as the planet. That's why we are committed to operating in a socially responsible and sustainable way.

    Connect with Us

    • Contact
    • Careers
Get in Touch
Rewterz
Rewterz Threat Advisory – Microsoft Multiple Products Multiple Vulnerabilities
January 10, 2019
Rewterz
Rewterz Threat Advisory – CVE-2019-0545 – Microsoft .NET Framework Security Bypass Vulnerability
January 10, 2019

Rewterz Threat Advisory – Microsoft Windows Server 2016 / Windows 10 Multiple Vulnerabilities

January 10, 2019

SEVERITY: High

 

 

ANALYSIS SUMMARY

 

 

Multiple vulnerabilities have been reported in Microsoft Windows Server 2016 and Microsoft Windows 10.

 

CVE-2019-0584
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory.

 

CVE-2019-0578
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory.

 

CVE-2019-0550
A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system.

 

CVE-2019-0573
An elevation of privilege vulnerability exists when the Windows Data Sharing Service improperly handles file operations.

 

CVE-2019-0574
An elevation of privilege vulnerability exists when the Windows Data Sharing Service improperly handles file operations.

 

CVE-2019-0580
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory.

 

CVE-2019-0553
An information disclosure vulnerability exists when Windows Subsystem for Linux improperly handles objects in memory.

 

CVE-2019-0536
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory.

 

CVE-2019-0547
A memory corruption vulnerability exists in the Windows DHCP client when an attacker sends specially crafted DHCP responses to a client.

 

CVE-2019-0570

An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory.

 

CVE-2019-0555
An elevation of privilege vulnerability exists in the Microsoft XmlDocument class that could allow an attacker to escape from the AppContainer sandbox in the browser.

 

CVE-2019-0538
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory.

 

CVE-2019-0572
An elevation of privilege vulnerability exists when the Windows Data Sharing Service improperly handles file operations.

 

CVE-2019-0549
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory.

 

CVE-2019-0577
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory.

 

CVE-2019-0576
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory.

 

CVE-2019-0554
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory.

 

CVE-2019-0583
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory.

 

CVE-2019-0551
A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system.

 

CVE-2019-0575
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory.

 

CVE-2019-0571
An elevation of privilege vulnerability exists when the Windows Data Sharing Service improperly handles file operations.

 

CVE-2019-0582
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory.

 

CVE-2019-0552
An elevation of privilege exists in Windows COM Desktop Broker.

 

CVE-2019-0581
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory.

 

CVE-2019-0569
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory.

 

CVE-2019-0579
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory.

 

CVE-2019-0543
An elevation of privilege vulnerability exists when Windows improperly handles authentication requests.

 

 

AFFECTED PRODUCTS

 

 

Microsoft Windows 10
Microsoft Windows Server 2016

 

 

IMPACT

 

 

Privilege escalation
System access
Exposure of sensitive information
Security Bypass

 

 

REMEDIATION

 

 

Vendor has released patches for the following products:

  • Windows 10 for 32-bit Systems (KB4480962):
    https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4480962

 

  • Windows 10 Version 1709 for 32-bit Systems (KB4480978):
    https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4480978

 

  • Windows 10 Version 1809 for ARM64-based Systems (KB4480116):
    https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4480116

 

  • Windows 10 Version 1809 for x64-based Systems (KB4480116):
    https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4480116

 

  • Windows 10 Version 1809 for 32-bit Systems (KB4480116):
    https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4480116

 

  • Windows Server 2016 (KB4480961):
  • Windows 10 Version 1607 for x64-based Systems (KB4480961):
  • Windows Server 2016 (Server Core installation) (KB4480961):
    https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4480961

 

  • Windows 10 Version 1607 for 32-bit Systems (KB4480961):
    https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4480961

 

  • Windows 10 for x64-based Systems (KB4480962):
    https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4480962

 

  • Windows 10 Version 1803 for ARM64-based Systems (KB4480966):
    https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4480966

 

  • Windows 10 Version 1803 for x64-based Systems (KB4480966):
  • Windows Server, version 1803 (Server Core Installation) (KB4480966):
    https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4480966

 

  • Windows 10 Version 1803 for 32-bit Systems (KB4480966):
    https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4480966

 

  • Windows 10 Version 1703 for x64-based Systems (KB4480973):
    https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4480973

 

  • Windows 10 Version 1703 for 32-bit Systems (KB4480973):
    https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4480973

 

  • Windows 10 Version 1709 for ARM64-based Systems (KB4480978):
    https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4480978

 

  • Windows 10 Version 1709 for x64-based Systems (KB4480978):
  • Windows Server, version 1709 (Server Core Installation) (KB4480978):
    https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4480978

 

  • Windows Server 2016 (KB4465659):
  • Windows 10 Version 1607 for x64-based Systems (KB4465659):
  • Windows Server 2016 (Server Core installation) (KB4465659):
    https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4465659

 

  • Windows 10 Version 1607 for 32-bit Systems (KB4465659):
    https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4465659

 

  • Windows 10 for x64-based Systems (KB4093430):
    https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4093430

 

  • Windows 10 for 32-bit Systems (KB4093430):
    https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4093430

 

  • Windows 10 Version 1703 for 32-bit Systems (KB4486458):
    https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4486458

 

  • Windows 10 Version 1703 for x64-based Systems (KB4486458):
    https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4486458

 

  • Windows 10 Version 1709 for 32-bit Systems (KB4477136):
    https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4477136

 

  • Windows 10 Version 1803 for 32-bit Systems (KB4477137):
    https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4477137

 

  • Windows 10 Version 1709 for ARM64-based Systems (KB4477136):
    https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4477136

 

  • Windows 10 Version 1709 for x64-based Systems (KB4477136):
  • Windows Server, version 1709 (Server Core Installation) (KB4477136):
    https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4477136

 

  • Windows 10 Version 1803 for ARM64-based Systems (KB4477137):
    https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4477137

 

  • Windows 10 Version 1803 for x64-based Systems (KB4477137):
  • Windows Server, version 1803 (Server Core Installation) (KB4477137):
    https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4477137

 

  • Windows 10 Version 1809 for ARM64-based Systems (KB4470788):
    https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4470788

 

  • Windows 10 Version 1809 for x64-based Systems (KB4470788):
    https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4470788

 

  • Windows 10 Version 1809 for 32-bit Systems (KB4470788):
    https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4470788

Platform

  • Rewterz XDR
  • Rewterz Defense
  • Rewterz Threat Intelligence

Managed Security Services

  • Managed Security Monitoring
  • Remote SOC
  • Onsite SOC
  • Hybrid SOC

Assess

  • Compromise Assessment
  • APT Assessment
  • Penetration Testing
  • Architecture Design & Review
  • Red Team Assessment
  • Purple Team Assessment
  • Social Engineering
  • Source Code Review

Transform

  • SOC Consultancy
  • SOC Maturity Assessment
  • SOC Model Evaluation
  • SOC Gap Analysis
  • SIEM Gap Analysis
  • SIEM Optimization
  • SOC Content Pack

Train

  • Simulated Cyber Attack Exercise
  • Tabletop Exercise
  • Security Awareness and Training

Respond

  • Incident Analysis
  • Incident Response

Threat Insights

  • Threat Advisories
  • Monthly Threat Insights
  • Threat Intelligence Reports

Resources

  • Blog
  • Press Releases

Connect With Us

  • Contact
  • Careers
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.
Get a Demo