Patch Tuesday June 2020: Update Highlights and Known Issues

windows 10 patch tuesday

Patch Tuesday June 2020 Edition

Microsoft rolled out the June 2020 Patch Tuesday updates on June 12, 2020. As always, with this batch of updates, the Redmond giant focuses on improving the overall functionality of the OS and fixing existing bugs.

This month’s updates are all about improving the security of most Windows components and apps. If you want to install the latest updates, you can check out this guide where you’ll also find the direct download links.

We already covered the key changes in these posts. Do check them out to learn what’s new:

Microsoft rolls out different Patch Tuesday updates for all the Windows 10 versions currently supported. For more information on the latest updates, check out our Windows 10 Patch Tuesday update history page.

What are the main fixes?

  • Adobe products

The June Patch Tuesday updates bring fixes to 10 Adobe-related CVEs, most of which target Adobe Flash, Experience Manager, and Framemaker.

2 of the CVEs were rated as being Critical, while 1 was deemed to be just Important.

  • Microsoft Outlook Security 

One of the CVEs covered and fixed in the June 2020 Patch Tuesday updates involve a Microsoft Outlook Security Vulnerability. If exploited, CVE-2020-1229 could allow attackers to automatically load remote images.

Those using Windows-based versions of Office can rest assured that patches to fix this issue is already available. However,  those still using Office 2016 for Mac and Office 2019 for Mac will have to wait a bit longer.

  • LNK

It seems that one of the CVEs fixed this month is one related to the LNK feature. Curiously enough, it seems to be the third time this year a CVE relate to this component gets discovered.

More so, CVE-2020-1299 behaves pretty much like the past ones, where an attacker could potentially exploit it to get code execution.

  • OLE data structures

CVE-2020-1281 is a bit more special compared to the rest since it can be used on all versions of Windows 10.

By exploiting this vulnerability, an attacked could get code execution rights if they can manage to make the user open certain files or programs.

  • CAB files

Another nasty CVE fixed this month is CVE-2020-1300 where attackers could gain code execution rights to certain systems by simply making users open modified CAB files.

Patch Tuesday list of CVEs

If you want to learn more about this month’s list of common vulnerabilities and exposures, you can check out the table below:

GDI+ Remote Code Execution VulnerabilityCVE-2020-1248Critical
LNK Remote Code Execution VulnerabilityCVE-2020-1299Critical
Microsoft Browser Memory Corruption VulnerabilityCVE-2020-1219Critical
Microsoft SharePoint Server Remote Code Execution VulnerabilityCVE-2020-1181Critical
Scripting Engine Memory Corruption VulnerabilityCVE-2020-1073Critical
VBScript Remote Code Execution VulnerabilityCVE-2020-1213Critical
VBScript Remote Code Execution VulnerabilityCVE-2020-1216Critical
VBScript Remote Code Execution VulnerabilityCVE-2020-1260Critical
Windows OLE Remote Code Execution VulnerabilityCVE-2020-1281Critical
Windows Remote Code Execution VulnerabilityCVE-2020-1300Critical
Windows Shell Remote Code Execution VulnerabilityCVE-2020-1286Critical
Component Object Model Elevation of Privilege VulnerabilityCVE-2020-1311Important
Connected Devices Platform Service Elevation of Privilege VulnerabilityCVE-2020-1211Important
Connected User Experiences and Telemetry Service Denial of Service VulnerabilityCVE-2020-1120Important
Connected User Experiences and Telemetry Service Denial of Service VulnerabilityCVE-2020-1244Important
Diagnostic Hub Standard Collector Elevation of Privilege VulnerabilityCVE-2020-1202Important
Diagnostic Hub Standard Collector Elevation of Privilege VulnerabilityCVE-2020-1203Important
Diagnostics Hub Standard Collector Elevation of Privilege VulnerabilityCVE-2020-1257Important
Diagnostics Hub Standard Collector Elevation of Privilege VulnerabilityCVE-2020-1278Important
Diagnostics Hub Standard Collector Elevation of Privilege VulnerabilityCVE-2020-1293Important
Group Policy Elevation of Privilege VulnerabilityCVE-2020-1317Important
Internet Explorer Information Disclosure VulnerabilityCVE-2020-1315Important
Jet Database Engine Remote Code Execution VulnerabilityCVE-2020-1208Important
Jet Database Engine Remote Code Execution VulnerabilityCVE-2020-1236Important
Media Foundation Information Disclosure VulnerabilityCVE-2020-1232Important
Media Foundation Memory Corruption VulnerabilityCVE-2020-1238Important
Media Foundation Memory Corruption VulnerabilityCVE-2020-1239Important
Microsoft Bing Search Spoofing VulnerabilityCVE-2020-1329Important
Microsoft Edge (Chromium-based) in IE Mode Spoofing VulnerabilityCVE-2020-1220Important
Microsoft Edge Information Disclosure VulnerabilityCVE-2020-1242Important
Microsoft Excel Remote Code Execution VulnerabilityCVE-2020-1225Important
Microsoft Excel Remote Code Execution VulnerabilityCVE-2020-1226Important
Microsoft Graphics Component Information Disclosure VulnerabilityCVE-2020-1160Important
Microsoft Office Remote Code Execution VulnerabilityCVE-2020-1321Important
Microsoft Office SharePoint XSS VulnerabilityCVE-2020-1177Important
Microsoft Office SharePoint XSS VulnerabilityCVE-2020-1183Important
Microsoft Office SharePoint XSS VulnerabilityCVE-2020-1297Important
Microsoft Office SharePoint XSS VulnerabilityCVE-2020-1298Important
Microsoft Office SharePoint XSS VulnerabilityCVE-2020-1318Important
Microsoft Office SharePoint XSS VulnerabilityCVE-2020-1320Important
Microsoft Outlook Security Feature Bypass VulnerabilityCVE-2020-1229Important
Microsoft Project Information Disclosure VulnerabilityCVE-2020-1322Important
Microsoft SharePoint Elevation of Privilege VulnerabilityCVE-2020-1295Important
Microsoft SharePoint Server Elevation of Privilege VulnerabilityCVE-2020-1178Important
Microsoft SharePoint Spoofing VulnerabilityCVE-2020-1148Important
Microsoft SharePoint Spoofing VulnerabilityCVE-2020-1289Important
Microsoft Store Runtime Elevation of Privilege VulnerabilityCVE-2020-1222Important
Microsoft Store Runtime Elevation of Privilege VulnerabilityCVE-2020-1309Important
Microsoft Windows Defender Elevation of Privilege VulnerabilityCVE-2020-1163Important
Microsoft Windows Defender Elevation of Privilege VulnerabilityCVE-2020-1170Important
NuGetGallery Spoofing VulnerabilityCVE-2020-1340Important
OLE Automation Elevation of Privilege VulnerabilityCVE-2020-1212Important
OpenSSH for Windows Elevation of Privilege VulnerabilityCVE-2020-1292Important
SharePoint Open Redirect VulnerabilityCVE-2020-1323Important
System Center Spoofing VulnerabilityCVE-2020-1331Important
Team Foundation Server HTML Injection VulnerabilityCVE-2020-1327Important
VBScript Remote Code Execution VulnerabilityCVE-2020-1214Important
VBScript Remote Code Execution VulnerabilityCVE-2020-1215Important
VBScript Remote Code Execution VulnerabilityCVE-2020-1230Important
Visual Studio Code Information Disclosure VulnerabilityCVE-2020-1343Important
Win32k Elevation of Privilege VulnerabilityCVE-2020-1207Important
Win32k Elevation of Privilege VulnerabilityCVE-2020-1247Important
Win32k Elevation of Privilege VulnerabilityCVE-2020-1251Important
Win32k Elevation of Privilege VulnerabilityCVE-2020-1253Important
Win32k Elevation of Privilege VulnerabilityCVE-2020-1258Important
Win32k Elevation of Privilege VulnerabilityCVE-2020-1310Important
Win32k Information Disclosure VulnerabilityCVE-2020-1290Important
Windows Background Intelligent Transfer Service Elevation of Privilege VulnerabilityCVE-2020-1255Important
Windows Backup Service Elevation of Privilege VulnerabilityCVE-2020-1271Important
Windows Bluetooth Service Elevation of Privilege VulnerabilityCVE-2020-1280Important
Windows Denial of Service VulnerabilityCVE-2020-1283Important
Windows Diagnostics & feedback Information Disclosure VulnerabilityCVE-2020-1296Important
Windows Elevation of Privilege VulnerabilityCVE-2020-1162Important
Windows Elevation of Privilege VulnerabilityCVE-2020-1324Important
Windows Error Reporting Elevation of Privilege VulnerabilityCVE-2020-1234Important
Windows Error Reporting Information Disclosure VulnerabilityCVE-2020-1261Important
Windows Error Reporting Information Disclosure VulnerabilityCVE-2020-1263Important
Windows Error Reporting Manager Elevation of Privilege VulnerabilityCVE-2020-1197Important
Windows Feedback Hub Elevation of Privilege VulnerabilityCVE-2020-1199Important
Windows GDI Elevation of Privilege VulnerabilityCVE-2020-0915Important
Windows GDI Elevation of Privilege VulnerabilityCVE-2020-0916Important
Windows GDI Information Disclosure VulnerabilityCVE-2020-1348Important
Windows Host Guardian Service Security Feature Bypass VulnerabilityCVE-2020-1259Important
Windows Installer Elevation of Privilege VulnerabilityCVE-2020-1272Important
Windows Installer Elevation of Privilege VulnerabilityCVE-2020-1277Important
Windows Installer Elevation of Privilege VulnerabilityCVE-2020-1302Important
Windows Installer Elevation of Privilege VulnerabilityCVE-2020-1312Important
Windows Kernel Elevation of Privilege VulnerabilityCVE-2020-0986Important
Windows Kernel Elevation of Privilege VulnerabilityCVE-2020-1237Important
Windows Kernel Elevation of Privilege VulnerabilityCVE-2020-1246Important
Windows Kernel Elevation of Privilege VulnerabilityCVE-2020-1262Important
Windows Kernel Elevation of Privilege VulnerabilityCVE-2020-1264Important
Windows Kernel Elevation of Privilege VulnerabilityCVE-2020-1266Important
Windows Kernel Elevation of Privilege VulnerabilityCVE-2020-1269Important
Windows Kernel Elevation of Privilege VulnerabilityCVE-2020-1273Important
Windows Kernel Elevation of Privilege VulnerabilityCVE-2020-1274Important
Windows Kernel Elevation of Privilege VulnerabilityCVE-2020-1275Important
Windows Kernel Elevation of Privilege VulnerabilityCVE-2020-1276Important
Windows Kernel Elevation of Privilege VulnerabilityCVE-2020-1307Important
Windows Kernel Elevation of Privilege VulnerabilityCVE-2020-1316Important
Windows Kernel Security Feature Bypass VulnerabilityCVE-2020-1241Important
Windows Lockscreen Elevation of Privilege VulnerabilityCVE-2020-1279Important
Windows Mobile Device Management Diagnostics Elevation of Privilege VulnerabilityCVE-2020-1204Important
Windows Modules Installer Service Elevation of Privilege VulnerabilityCVE-2020-1254Important
Windows Network Connections Service Elevation of Privilege VulnerabilityCVE-2020-1291Important
Windows Network List Service Elevation of Privilege VulnerabilityCVE-2020-1209Important
Windows Now Playing Session Manager Elevation of Privilege VulnerabilityCVE-2020-1201Important
Windows Print Configuration Elevation of Privilege VulnerabilityCVE-2020-1196Important
Windows Registry Denial of Service VulnerabilityCVE-2020-1194Important
Windows Runtime Elevation of Privilege VulnerabilityCVE-2020-1231Important
Windows Runtime Elevation of Privilege VulnerabilityCVE-2020-1233Important
Windows Runtime Elevation of Privilege VulnerabilityCVE-2020-1235Important
Windows Runtime Elevation of Privilege VulnerabilityCVE-2020-1265Important
Windows Runtime Elevation of Privilege VulnerabilityCVE-2020-1282Important
Windows Runtime Elevation of Privilege VulnerabilityCVE-2020-1304Important
Windows Runtime Elevation of Privilege VulnerabilityCVE-2020-1306Important
Windows Runtime Elevation of Privilege VulnerabilityCVE-2020-1334Important
Windows Runtime Information Disclosure VulnerabilityCVE-2020-1217Important
Windows Service Information Disclosure VulnerabilityCVE-2020-1268Important
Windows SMB Remote Code Execution VulnerabilityCVE-2020-1301Important
Windows SMBv3 Client/Server Denial of Service VulnerabilityCVE-2020-1284Important
Windows SMBv3 Client/Server Information Disclosure VulnerabilityCVE-2020-1206Important
Windows State Repository Service Elevation of Privilege VulnerabilityCVE-2020-1305Important
Windows Text Service Framework Elevation of Privilege VulnerabilityCVE-2020-1314Important
Windows Update Orchestrator Service Elevation of Privilege VulnerabilityCVE-2020-1313Important
Windows WalletService Elevation of Privilege VulnerabilityCVE-2020-1287Important
Windows WalletService Elevation of Privilege VulnerabilityCVE-2020-1294Important
Windows WLAN Service Elevation of Privilege VulnerabilityCVE-2020-1270Important
Word for Android Remote Code Execution VulnerabilityCVE-2020-1223Important

What are the best practices for Patch Tuesday?

There are a few things that you can do in order to make sure that your computer installs the latest Patch Tuesday updates without any issues. We all know that Windows updates often trigger errors.

In extreme cases, they may even render your PC completely unusable. Follow these tips to make sure the update install process goes as smoothly as possible.

How to download the latest PT updates

We have a special category where we keep track of all the monthly releases for the products that you are interested in.

Exploit Wednesday & Uninstall Thursday

Right after Patch Tuesday, hackers try to exploit the vulnerabilities left unpatched by Microsoft. This leads to an increase in the number of cyber-attacks.

On the other hand, many users often decide to uninstall the Patch Tuesday updates a few hours after install due to the large number of issues they triggered — hence the name Uninstall Thursday.

Check out this guide to learn more on how to stay safe after Patch Tuesday and make sure the updates don’t brick your computer.

Patch Tuesday: All your Questions Answered

  • When is Patch Tuesday released? 

Microsoft rolls out new Patch Tuesday updates on the second Tuesday of each month. The next Patch Tuesday Update is expected to arrive on July 14, 2020.

  • How does Patch Tuesday work?

We already answered this question in this quick guide. Do check it out to learn more on the mechanisms behind Patch Tuesday.

  • What is the bandwidth impact of Patch Tuesday?

When actively downloading updates, you may experience slow connection issues on your Windows 10 computer. This happens especially when updating multiple PCs at the same time.

The solution is to distribute the updates locally via WSUS. This means downloading the updates from Microsoft Servers.

Then, your Windows 10 computers can share the updates in a peer-to-peer manner over the local network resulting in a faster update process.

Patch Tuesday Troubleshooting

Oftentimes, Patch Tuesday updates trigger various errors on Windows computers. These may range from minor glitches to technical issues that may render your computer unusable.

We covered extensively Patch Tuesday issues we compiled hundreds of troubleshooting guides to help you solve these problems quickly.