{"id":15396,"date":"2020-08-20T07:27:42","date_gmt":"2020-08-20T05:27:42","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=15396"},"modified":"2022-03-24T00:41:17","modified_gmt":"2022-03-23T23:41:17","slug":"windows-8-1-windows-server-2012-r2-update-kb4578013-verfgbar","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2020\/08\/20\/windows-8-1-windows-server-2012-r2-update-kb4578013-verfgbar\/","title":{"rendered":"Windows 8.1\/ Windows Server 2012 R2: Update KB4578013"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2013\/03\/winb.jpg\" width=\"58\" height=\"58\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2020\/08\/20\/windows-8-1-windows-server-2012-r2-update-kb4578013-verfgbar\/\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>]Microsoft has released an unscheduled security update KB4578013 for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 on August 19, 2020. It is a revision to remediate the Remote Access Elevation of Privileges vulnerabilities that were patched on August 11, 2020. Here is some information.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg08.met.vgwort.de\/na\/7cb4dd40930648bd8fd9877722484472\" alt=\"\" width=\"1\" height=\"1\" \/>I received the information about the unscheduled update as <a href=\"https:\/\/borncity.com\/win\/2020\/08\/12\/patchday-windows-8-1-server-2012-updates-august-11-2020\/#comment-12289\" target=\"_blank\" rel=\"noopener noreferrer\">a comment<\/a> and as a security advice from Microsoft (see below).<\/p>\n<h2>Microsoft Security Advisory August 19, 2020<\/h2>\n<p>Microsoft sent out a security advisory with information about the update last night. This special update resolves the remote access elevation of privileges vulnerabilities CVE-2020-1530 and CVE-2020-1537.<\/p>\n<p>**************************************************************************************<br \/>\nTitle: Microsoft Security Update Releases<br \/>\nIssued: August 19, 2020<br \/>\n**************************************************************************************<\/p>\n<p>Summary<br \/>\n=======<\/p>\n<p>The following CVEs have undergone a major revision increment:<\/p>\n<p>* CVE-2020-1530<br \/>\n* CVE-2020-1537<br \/>\nRevision Information:<br \/>\n=====================<\/p>\n<p>* CVE-2020-1530<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2020-1530\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1530<\/a> | Windows Remote Access Elevation of Privilege Vulnerability-<br \/>\n&#8211; Version 2.0<br \/>\n&#8211; Reason for Revision: Microsoft is announcing the availability of security update<br \/>\n4578013 for all supported versions of Microsoft 8.1 and Windows Server 2012 R2.<br \/>\nCustomers running Windows 8.1 or Server 2012 R2 should install the update for<br \/>\ntheir product to be protected from this vulnerability. Customers running other<br \/>\nversions of Microsoft Windows or Windows Server do not need to take any action.<br \/>\nSee the Security Updates table for more information and download links.<br \/>\n&#8211; Originally posted: August 12, 2020<br \/>\n&#8211; Updated: August 19, 2020<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>* CVE-2020-1537<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2020-1537\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1537<\/a> | Windows Remote Access Elevation of Privilege Vulnerability<br \/>\n&#8211; Version 2.0<br \/>\n&#8211; Reason for Revision: Microsoft is announcing the availability of security update<br \/>\n4578013 for all supported versions of Microsoft 8.1 and Windows Server 2012 R2.<br \/>\nCustomers running Windows 8.1 or Server 2012 R2 should install the update for<br \/>\ntheir product to be protected from this vulnerability. Customers running other<br \/>\nversions of Microsoft Windows or Windows Server do not need to take any action.<br \/>\nSee the Security Updates table for more information and download links.<br \/>\n&#8211; Originally posted: August 12, 2020<br \/>\n&#8211; Updated: August 19, 2020<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>The following applies to both vulnerabilities: Improper handling of memory in the Windows Remote Access function can lead to privilege escalation under the mentioned operating systems. To exploit this vulnerability, an attacker would first have to establish a remote access connection to the victim's system. The attacker could then execute a specially designed application to elevate privileges.<\/p>\n<blockquote><p>The vulnerability has already been closed for Windows 7 SP1 up to Windows 10 and the server counterparts for Patchday August 11, 2020. A revision update KB4578013 for Microsoft 8.1 (including RT variant) and Windows Server 2012 R2 is apparently required as of August 19, 2020.<\/p><\/blockquote>\n<h2>Update KB4578013 for Microsoft 8.1<\/h2>\n<p>Update <a href=\"https:\/\/support.microsoft.com\/help\/4578013\/\" target=\"_blank\" rel=\"noopener noreferrer\">KB4578013<\/a> for Microsoft 8.1, Windows RT 8.1 and Windows Server 2012 R2 is intended to address the two Windows Remote Access Elevation of Privilege vulnerabilities <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1530\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1530<\/a> and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-us\/vulnerability\/CVE-2020-1537\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1537<\/a>. According to Microsoft's kb article, this update shall only be available in the <a href=\"http:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=KB4578013\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Update Catalog<\/a> for manual download and subsequent installation. They wrote:<\/p>\n<blockquote>\n<h4><span style=\"font-weight: bold;\">How to get this update<\/span><\/h4>\n<hr \/>\n<h5>Microsoft Update Catalog<\/h5>\n<p>To get the standalone package for this update, go to the <a href=\"http:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=KB4578013\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Update Catalog<\/a> website.<\/p><\/blockquote>\n<p>But German readers commented, that they received this update via Windows Update and in WSUS too! And the KB article quote, that no reboot is necessary, while user reports, that a reboot is required (so the KB article is just a mess). Why Microsoft has to make improvements and why the unscheduled update is quoted in the kb article as 'only available for download in the Microsoft Update Catalog', is still Redmond's secret (maybe they haven't fixed the vulnerability in the patch from August 11, 2018). But they added <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/release-information\/windows-message-center#461\" target=\"_blank\" rel=\"noopener noreferrer\">an entry<\/a> to the Windows Message-Center:<\/p>\n<blockquote><p><b><a href=\"https:\/\/support.microsoft.com\/help\/4578013\" target=\"_blank\" rel=\"noopener noreferrer\">Take action: August 19, 2020 Windows 8.1 and Windows Server 2012 R2 out of band security update available<\/a><\/b><\/p>\n<p>An out of band security update has been released for Windows 8.1 and Windows Server 2012 R2. This update addresses two Windows Remote Access Elevation of Privilege vulnerabilities. We recommend that you install these updates promptly. For information about the update, see <a href=\"https:\/\/support.microsoft.com\/help\/4578013\" target=\"_blank\" rel=\"noopener noreferrer\">KB4578013<\/a>. For more information about these vulnerabilities, see <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1530\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1530<\/a> and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-us\/vulnerability\/CVE-2020-1537\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1537<\/a>.<\/p><\/blockquote>\n<p>The fragments of information that were published there don't fit together. I let it up to you to decide, if the update install is necessary &#8211; without excessive tests I would not install it on production systems with Windows Server 2012 R2. On Windows 8.1 clients for consumer it's probably not too important to install that patch &#8211; but I don't know. The message center says the patch is important &#8211; and German readers wrote, that the update is quoted as 'important' (my test machine with W8.1 still hasn't found that update yet). But remote sessions to Windows 8.1 clients are not widely used. And within the CVEs Microsoft wrote:\u00a0 '2 &#8211; Exploitation Less Likely'.<\/p>\n<blockquote><p>I guess, the right right hand in Redmond does not know what the left hand is doing. I've informed Redmond via Twitter to update their KB articles at least, to be consistent, what they are writing.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>[German]Microsoft has released an unscheduled security update KB4578013 for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 on August 19, 2020. It is a revision to remediate the Remote Access Elevation of Privileges vulnerabilities that were patched on &hellip; <a href=\"https:\/\/borncity.com\/win\/2020\/08\/20\/windows-8-1-windows-server-2012-r2-update-kb4578013-verfgbar\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,22,2],"tags":[2544,69,195,23,567],"class_list":["post-15396","post","type-post","status-publish","format-standard","hentry","category-security","category-update","category-windows","tag-kb4578013","tag-security","tag-update","tag-windows-8-1","tag-windows-server-2012-r2"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/15396","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=15396"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/15396\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=15396"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=15396"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=15396"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}