August has brought 114 vulnerabilities targeted to Windows OS, browsers and Microsoft Office. This month there are actually patches to fix rather remarkable vulnerabilities.

At first there is a critical vulnerability CVE-2020-1472 targeted to Windows Server domain controllers. The vulnerability has the highest scoring of 10.0 in CVSS rating. In addition to that there is a vulnerability which has been publicly disclosed (CVE-2020-1464). The very same vulnerability also has been exploited in wild. There is also a second vulnerability which has been exploited in wild (CVE-2020-1380).

The impact and scoring of these and other vulnerabilities can be explored with Common Vulnerability Scoring System Calculator. Microsoft posts CVSS-calculator (maintained by National Vulnerability Database) links for all the vulnerabilities in their vulnerability articles. More thorough information of the vulnerabilities can be found from Microsoft’s MSRC-portal.

There does not seem to be anything major considering known issues this August. Therefore, the known issues should not be a problem to start patching the vulnerabilities.

Operating system

Known issues (last month)

Windows 10, version 2004 and Windows Server, version 2004

1 (0)

Windows 10, version 1909 ja 1903* and Windows Server, version 1903

0 (1)

Windows 10, version 1809 and Windows Server 2019

2 (1)

Windows 10, version 1803**

0 (0)

Windows 10, version 1709** and Windows Server, version 1709

0 (0)

Windows 10, version 1703***

Reached end of service

Windows 10, version 1607 LTSC*** and Windows Server 2016

1 (1)

Windows 8.1**** and Windows Server 2012 R2

1 (1)

Windows Server 2012

1 (1)

Windows 7**** and Windows Server 2008 R2 SP1

2 (2)

* 1909 shares the same core and system files with the predecessor 1903.

** The support for the specific feature update for version Home and Pro has ended.

*** The support for the specific feature update for all the version has ended.

**** Mainstream support for the operating system has ended: Windows 8.1 1/10/2023 and Windows 7 1/14/2020.

The critical patch CVE-2020-1472 should be updated without any delay. Otherwise, the monthly security updates can follow the regular processes. However, Centero recommends to test the updates thoroughly before deploying them to production endpoints. In addition to this, all the known issues should be read through and reflected to own environment.

Microsoft maintains a list of Windows updates and their known issues on the following pages.

With Centero Software Manager Cloud and CSM Cloud for Servers it’s possible to deploy these updates into your environment and even on remote computers by the configuration you have defined.

Read more on this topic:

Comparing Patch Management solutions – Part 12/12 – Results

Our blog series, giving background on our Patch Management comparison, has now arrived to its last post, where we’ll look at the result summary.

Top Things that Annoy People regarding Continuous Security Updates

We asked people to tell us what the most annoying things are regarding security updates. Security updates are clearly a source of great annoyance.