Microsoft releases OOB security updates for Windows 10 RCE bugs

Microsoft has released two out-of-band security updates to address remote code execution security vulnerabilities affecting the Microsoft Windows Codecs Library on Windows 10, version 1709 or later.

The two vulnerabilities are tracked as CVE-2020-1425 and CVE-2020-1457, the first one being rated as critical while the second received an important severity rating.

The security updates addressing these security issues will be installed automatically on all vulnerable systems unless automatic updating for Microsoft Store apps is disabled.

Both desktop and server platforms affected

In both cases, the remote code execution issue is caused by the way that Microsoft Windows Codecs Library handles objects in memory. Exploitation of these vulnerabilities requires a program to process a specially crafted image file.

"Only customers who have installed the optional HEVC or 'HEVC from Device Manufacturer' media codecs from Microsoft Store may be vulnerable," according to Microsoft.

After successfully exploiting CVE-2020-1425, attackers "could obtain information to further compromise the user’s system," while successful exploitation of  CVE-2020-1457 could lead to arbitrary code execution on vulnerable systems.

According to Microsoft, the two out-of-band security updates address the vulnerabilities "by correcting how Microsoft Windows Codecs Library handles objects in memory."

Both security issues impact 32-bit, x64-based, and ARM64-based devices running the following Windows 10 versions:

• Windows 10, version 1709
• Windows 10, version 1803
• Windows 10, version 1809
• Windows 10, version 1903
• Windows 10, version 1909
• Windows 10, version 2004

No mitigation available, updates will install automatically

Microsoft says that it has not identified any mitigating measures or workarounds for these two vulnerabilities.

"Affected customers will be automatically updated by Microsoft Store. Customers do not need to take any action to receive the update," Microsoft explains,

"Alternatively, customers who want to receive the update immediately can check for updates with the Microsoft Store App; more information on this process can be found here."

Both vulnerabilities were reported to Microsoft by vulnerability analysis manager Abdul-Aziz Hariri through Trend Micro's Zero Day Initiative.


Update July 02, 13:24 EDT: Removed Windows Server from the list of affected systems and included HEVC info.

Related Articles:

Microsoft November 2024 Patch Tuesday fixes 4 zero-days, 89 flaws

Zero-Day Bug in KDE 4/5 Executes Commands by Opening a Folder

Microsoft October 2024 Patch Tuesday fixes 5 zero-days, 118 flaws

Windows Server 2025 released—here are the new features

Hackers exploit critical bug in Array Networks SSL VPN products