Microsoft published patches for 87 vulnerabilities this November for Windows OS, Microsoft Browsers and Microsoft Office. The count of vulnerabilities is under 100 this month as well. Let’s hope that this trend continues.

Google disclosed a zero-day vulnerability publicly last week. The vulnerability is related to Windows OS. This is quite a critical vulnerability because it is already exploited and it is publicly disclosed. The zero-day vulnerability CVE-2020-17087 has CVSS scoring of 7.8. In addition to this there is a vulnerability with 9.8 CVSS scoring: CVE-2020-17051. These two vulnerabilities should be focused this month.

The impact and scoring of these and other vulnerabilities can be explored with Common Vulnerability Scoring System Calculator. Microsoft posts CVSS-calculator (maintained by National Vulnerability Database) links for all the vulnerabilities in their vulnerability articles. More thorough information of the vulnerabilities can be found from Microsoft’s MSRC-portal.

The known issues are pretty much the same as last month. Based on that information the administrators can still continue deploying the monthly patches following normal procedures.

Operating system

Known issues (last month)

Windows 10, version 2004 and Windows Server, version 2004

2 (2)

Windows 10, version 1909 ja 1903* and Windows Server, version 1903

1 (2)

Windows 10, version 1809 and Windows Server 2019

1 (2)

Windows 10, version 1803**

0 (1)

Windows 10, version 1709** and Windows Server, version 1709

1 (0)

Windows 10, version 1703***

Reached end of service

Windows 10, version 1607 LTSC*** and Windows Server 2016

1 (2)

Windows 8.1**** and Windows Server 2012 R2

1 (2)

Windows Server 2012

1 (1)

Windows 7**** and Windows Server 2008 R2 SP1

2 (2)

* 1909 shares the same core and system files with the predecessor 1903.

** The support for the specific feature update for version Home and Pro has ended.

*** The support for the specific feature update for all the version has ended.

**** Mainstream support for the operating system has ended: Windows 8.1 1/10/2023 and Windows 7 1/14/2020.

The zero-day vulnerability should patched as soon as possible, especially if Google Chrome is in use and it might not be patched. However, Centero recommends to test the updates thoroughly before deploying them to production endpoints. In addition to this, all the known issues should be read through and reflected to own environment.

Microsoft maintains a list of Windows updates and their known issues on the following pages.

With Centero Software Manager Cloud and CSM Cloud for Servers it’s possible to deploy these updates into your environment and even on remote computers by the configuration you have defined.

Read more on this topic:

Chromium-based Edge is now available on Centero Software Manager

You asked, we listened Yes! That’s true! New Chromium based Edge is now available on Centero Software Manager (CSM). You can now get the same easy experience for updating Edge, as with updating any other 3rd party application available on Centero Software Manager. Until now, you were able to deploy Chromium Edge through Intune and […]

Comparing Patch Management solutions – Part 1/12 – Background on the comparison

We are launching a series of blog posts based on our Patch Management Tools’ Comparison, conducted in 2019. We’ll start the blog series by explaining the background of the tool comparison. Hop along and dive into the world of Patch Management!