Microsoft Released January 2020 Patch Tuesday to Fix 49 Security Bugs

Windows Patch Tuesday Update of January 2020 is released with a bundle of security bug fixes. This latest Windows patch is packed with fixes for 49 vulnerabilities out of which 8 are rated as critical and several are rated as important.

The Windows users are suggested to download January 2020 update and apply it to avoid these security bugs including a vulnerability in CryptoAPI (Crypt32.dll) that is default Windows cryptographic library.

Microsoft Patch Tuesday January 2020

This latest Microsoft Windows January 2020 Security Updates are released for all supported versions of Windows clients and servers. we also have collection of monthly Patch Tuesday offline installer links here

Recommended: Download Windows 10 Cumulative Update KB4528760 Offline Installer for Version 1909 and 1903

Windows Operating System Distribution

  • Windows 10 version 1909: Fixed 29 vulnerabilities including one critical and 28 important bugs.
  • Windows 10 version 1903: Fixed 29 vulnerabilities including one critical and 28 important bugs.
  • Windows 10 version 1809: Fixed 29 vulnerabilities including one critical and 28 important bugs.
  • Windows 10 version 1803: Fixed 29 vulnerabilities including one critical and 28 important bugs.
  • Windows 8.1: Fixed 23 vulnerabilities including one critical and 22 important security issues.
  • Windows 7: Fixed 18 vulnerabilities including one critical and 17 important security issues.

Windows Servers Distribution

  • Windows Server 2019: Fixed 33 vulnerabilities including 3 critical and 28 important security issues.
  • Windows Server 2016: Fixed 31 vulnerabilities including 3 critical and 30 important security issues.
  • Windows Server 2012 R2: Fixed 26 vulnerabilities including 3 critical and 23 important security issues.
  • Windows Server 2008 R2: Fixed 13 vulnerabilities including 1 critical and 12 important security issues.

Others Microsoft Products Distribution

  • Internet Explorer 11: Fixed one vulnerability that is rated as critical.

Detail of Fixes Incorporated in Microsoft Windows Security Updates January 2020

  • CVE-2020-0606 – NET Framework Remote Code Execution Vulnerability
  • CVE-2020-0605 – .NET Framework Remote Code Execution Vulnerability
  • CVE-2020-0646 – .NET Framework Remote Code Execution Injection Vulnerability
  • CVE-2020-0654 – Microsoft OneDrive for Android Security Feature Bypass Vulnerability
  • CVE-2020-0603 – ASP.NET Core Remote Code Execution Vulnerability
  • CVE-2020-0602 – ASP.NET Core Denial of Service Vulnerability
  • CVE-2020-0615 – Windows Common Log File System Driver Information Disclosure Vulnerability
  • CVE-2020-0634 – Windows Common Log File System Driver Elevation of Privilege Vulnerability
  • CVE-2020-0639 – Windows Common Log File System Driver Information Disclosure Vulnerability
  • CVE-2020-0656 – Microsoft Dynamics 365 (On-Premise) Cross-Site Scripting Vulnerability
  • CVE-2020-0622 – Microsoft Graphics Component Information Disclosure Vulnerability
  • CVE-2020-0607 – Microsoft Graphics Components Information Disclosure Vulnerability
  • CVE-2020-0642 – Win32k Elevation of Privilege Vulnerability
  • CVE-2020-0643 – Windows GDI+ Information Disclosure Vulnerability
  • CVE-2020-0650 – Microsoft Excel Remote Code Execution Vulnerability
  • CVE-2020-0652 – Microsoft Office Memory Corruption Vulnerability
  • CVE-2020-0653 – Microsoft Excel Remote Code Execution Vulnerability
  • CVE-2020-0651 – Microsoft Excel Remote Code Execution Vulnerability
  • CVE-2020-0647 – Microsoft Office Online Spoofing Vulnerability
  • CVE-2020-0640 – Internet Explorer Memory Corruption Vulnerability
  • CVE-2020-0644 – Windows Elevation of Privilege Vulnerability
  • CVE-2020-0624 – Win32k Elevation of Privilege Vulnerability
  • CVE-2020-0635 – Windows Elevation of Privilege Vulnerability
  • CVE-2020-0620 – Microsoft Cryptographic Services Elevation of Privilege Vulnerability
  • CVE-2020-0616 – Microsoft Windows Denial of Service Vulnerability
  • CVE-2020-0608 – Win32k Information Disclosure Vulnerability
  • CVE-2020-0601 – Windows CryptoAPI Spoofing Vulnerability
  • CVE-2020-0621 – Windows Security Feature Bypass Vulnerability
  • CVE-2020-0633 – Windows Search Indexer Elevation of Privilege Vulnerability
  • CVE-2020-0623 – Windows Search Indexer Elevation of Privilege Vulnerability
  • CVE-2020-0613 – Windows Search Indexer Elevation of Privilege Vulnerability
  • CVE-2020-0614 – Windows Search Indexer Elevation of Privilege Vulnerability
  • CVE-2020-0632 – Windows Search Indexer Elevation of Privilege Vulnerability
  • CVE-2020-0627 – Windows Search Indexer Elevation of Privilege Vulnerability
  • CVE-2020-0628 – Windows Search Indexer Elevation of Privilege Vulnerability
  • CVE-2020-0625 – Windows Search Indexer Elevation of Privilege Vulnerability
  • CVE-2020-0626 – Windows Search Indexer Elevation of Privilege Vulnerability
  • CVE-2020-0629 – Windows Search Indexer Elevation of Privilege Vulnerability
  • CVE-2020-0631 – Windows Search Indexer Elevation of Privilege Vulnerability
  • CVE-2020-0630 – Windows Search Indexer Elevation of Privilege Vulnerability
  • CVE-2020-0617 – Hyper-V Denial of Service Vulnerability
  • CVE-2020-0641 – Microsoft Windows Elevation of Privilege Vulnerability
  • CVE-2020-0610 – Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability
  • CVE-2020-0609 – Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability
  • CVE-2020-0637 – Remote Desktop Web Access Information Disclosure Vulnerability
  • CVE-2020-0611 – Remote Desktop Client Remote Code Execution Vulnerability
  • CVE-2020-0612 – Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability
  • CVE-2020-0638 – Update Notification Manager Elevation of Privilege Vulnerability
  • CVE-2020-0636 – Windows Subsystem for Linux Elevation of Privilege Vulnerability

Leave a Comment

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.