Microsoft’s Patch Tuesday updates for November 2019 fix over 70 vulnerabilities, including an Internet Explorer flaw that has been exploited in attacks.
The zero-day vulnerability, tracked as CVE-2019-1429, affects the scripting engine used by Internet Explorer 9, 10 and 11. Microsoft describes the security hole as a memory corruption bug that can allow an attacker to execute arbitrary code in the context of the current user by convincing the target to visit a specially crafted website with Internet Explorer or open a malicious Office document.
Microsoft has credited an anonymous researcher working with iDefense Labs, Ivan Fratric of Google Project Zero, Clément Lecigne of Google’s Threat Analysis Group, and Resecurity for reporting the vulnerability.
Google’s Threat Analysis Group has informed Microsoft of several actively exploited Windows and Internet Explorer vulnerabilities in the past year, but information about the attacks is rarely made public. In many cases, however, these flaws were likely exploited in targeted attacks rather than mass exploitation campaigns.
On the other hand, Trend Micro’s Zero Day Initiative (ZDI) has pointed out that other threat groups could also start exploiting CVE-2019-1429 now that they have access to the patch.
ZDI also notes that since the vulnerability can be exploited via malicious Office documents, even users who don’t utilize Internet Explorer are vulnerable to attacks — Microsoft says the attack works if the document hosts the Internet Explorer rendering engine.
SecurityWeek has reached out to both Resecurity and Google to see if they can share any information on the attacks currently exploiting CVE-2019-1429.
A dozen other critical vulnerabilities that allow remote code execution have been patched this month by Microsoft, including ones affecting Exchange, Windows, Internet Explorer, and Hyper-V.
“Looking through the Critical-rated patches, the updates for Hyper-V stand out the most. Five separate code execution bugs receive patches this month, and each could allow a user on the guest OS to execute code on the underlying host OS,” ZDI said in a blog post.
UPDATE. In a blog post published on Tuesday, Resecurity revealed that CVE-2019-1429 and a previously reported vulnerability, tracked as CVE-2019-0880, are likely exploited by the same threat group.
“We assume both identified 0-day vulnerabilities are related to the tradecraft of the same cyberespionage group focused on APT campaigns against defense, federal and financial sector. The geography of their end targets (victims) is extremely broad and include Middle East, APAC, USA and European Union. Previously, the group was leveraging possible ‘false flag’ attack – that’s why attribution at this moment is fuzzy. We continue to monitor the activity of the group and update our customers and intelligence community about the new previously unknown threats and zero-day vulnerabilities,” says Gene Yoo, CEO of Resecurity.
Related: Microsoft Patches Two Windows Flaws Exploited in Targeted Attacks
Related: Microsoft Patches Internet Explorer Zero-Day Reported by Google
Related: Microsoft Patches Internet Explorer Vulnerability Exploited in Attacks

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- FDA Announces New Cybersecurity Requirements for Medical Devices
- Mandiant Investigating 3CX Hack as Evidence Shows Attackers Had Access for Months
- Unpatched Security Flaws Expose Water Pump Controllers to Remote Hacker Attacks
- 3CX Confirms Supply Chain Attack as Researchers Uncover Mac Component
- OpenSSL 1.1.1 Nears End of Life: Security Updates Only Until September 2023
- Google Links More iOS, Android Zero-Day Exploits to Spyware Vendors
- ChatGPT Data Breach Confirmed as Security Firm Warns of Vulnerable Component Exploitation
- Thousands Access Fake DDoS-for-Hire Websites Set Up by UK Police
Latest News
- Italy Temporarily Blocks ChatGPT Over Privacy Concerns
- FDA Announces New Cybersecurity Requirements for Medical Devices
- Report: Chinese State-Sponsored Hacking Group Highly Active
- Votiro Raises $11.5 Million to Prevent File-Borne Threats
- Lumen Technologies Hit by Two Cyberattacks
- Leaked Documents Detail Russia’s Cyberwarfare Tools, Including for OT Attacks
- Mandiant Investigating 3CX Hack as Evidence Shows Attackers Had Access for Months
- Severe Azure Vulnerability Led to Unauthenticated Remote Code Execution
