There are 121 published vulnerabilities for the following products this month: Windows OS, browsers and Microsoft Office. The same trend keep on going. According to the previous 4 months it is normal that the number of vulnerabilities is over 100.

This June there are 3 vulnerabilities with monthly high CVSS scoring of 8.8: CVE-2020-1239, CVE-2020-1238 and CVE-2020-1292. The impacts on these vulnerabilities are remote code execution and elevation of privileges.

The good trend keeps up also on publicly disclosed vulnerabilities and already exploited vulnerabilities. There are none this month.

The impact and scoring of these and other vulnerabilities can be explored with Common Vulnerability Scoring System Calculator. Microsoft posts CVSS-calculator (maintained by National Vulnerability Database) links for all the vulnerabilities in their vulnerability articles. More thorough information of the vulnerabilities can be found from Microsoft’s MSRC-portal.

This patch Tuesday the 2004 feature update of Windows 10 also receives its first monthly quality and security update. In addition to the mild security updates same could said about known issues too. There are not so many this month. Administrators should proceed with regular patching processes once again.

Operating system

Known issues (last month)

Windows 10, version 2004 and Windows Server, version 2004

0

Windows 10, version 1909 ja 1903* and Windows Server, version 1903

1 (0)

Windows 10, version 1809 and Windows Server 2019

1 (1)

Windows 10, version 1803**

0 (0)

Windows 10, version 1709** and Windows Server, version 1709

0 (0)

Windows 10, version 1703***

Reached end of service

Windows 10, version 1607 LTSC*** and Windows Server 2016

1 (1)

Windows 8.1**** and Windows Server 2012 R2

1 (0)

Windows Server 2012

1 (0)

Windows 7**** and Windows Server 2008 R2 SP1

2 (1)

* 1909 shares the same core and system files with the predecessor 1903.

** The support for the specific feature update for version Home and Pro has ended.

*** The support for the specific feature update for all the version has ended.

**** Mainstream support for the operating system has ended: Windows 8.1 1/10/2023 and Windows 7 1/14/2020.

The security updates do not require any special exceptions or processes this month. Centero recommends to test the updates thoroughly before deploying them to production endpoints. In addition to this, all the known issues should be read through and reflected to own environment.

Microsoft maintains a list of Windows updates and their known issues on the following pages.

With Centero Software Manager Cloud and CSM Cloud for Servers it’s possible to deploy these updates into your environment and even on remote computers by the configuration you have defined.

Read more on this topic:

A New Comparison Chart is Here! – Download the Updated Version of Patch Management Tools’ Comparison for Free

We have completed the updated version of the patch management comparison. Download the patch management tool comparison for free!

CSM for SCCM: New setting to ease updates for running applications

SCCM deployment is not going through, or has managed to break down a user’s application. Sound familiar? We are now introducing a new feature for our CSM for SCCM patch management product to help you avoid these situations even better. One challenge for Configuration Manager’s application deployment is a situation where the updated application is […]