"Microsoft is aware of an SSL/TLS digital certificate for *.xboxlive.com for which the private keys were inadvertently disclosed. The certificate could be used in attempts to perform man-in-the-middle attacks," the software giant explained in their advisory.
"To help protect customers from potentially fraudulent use of the SSL/TLS digital certificate, the certificate has been deemed no longer valid and Microsoft is updating the Certificate Trust list (CTL) for all supported releases of Microsoft Windows to remove the trust of the certificate."
The newly updated CTL will be pushed to all supported versions of Windows.
Tod Beardsley, Security Research Manager at Rapid7, called the accidental disclosure cryptographic hygiene miss, "but on the whole, users are unlikely to be adversely affected, provided they update their local Certificate Trust List in the usual way."
"It's possible that private information such as passwords and payment information was exposed during the time the private key was both known and the public certificates haven't been changed, but for most people, this would appear unlikely," Beardsley added.
The reason it's unlikely, Beardsley said, is because an attacker would need to have been aware of the private key and at least recording SSL sessions via a man-in-the-middle.
"This scenario would require the attacker to be somewhere along the path between the victim and Microsoft's servers," he said.
For customers running versions of Windows on mobile devices (Windows Phone 8 and 8.1, Windows 10 Mobile); desktop (Windows 8, 8.1, RT, RT 8.1, Windows 10); and server (Server 2012, Server 2012 R2) the CTL will be updated automatically via the CTL updater.
Systems running Vista, Windows 7, Windows Server 2008, or Windows Server 2008 R2 will need to make sure they've installed the CTL updater service (KB 2677070).
While the compromised keys could've been used to perform man-in-the-middle attacks prior to them being revoked, it's important to note they couldn't be used to issue other certificates, impersonate other domains, or sign code, Microsoft says.
"The troubling part is that Microsoft was aware of the key disclosure for at least a week," Beardsley said, noting the advisory stated the certificate has been disallowed since December 1.
"As unlikely as an active or passive man-in-the-middle attack is, it's even less likely the private key happened to be disclosed on a regularly scheduled Patch Tuesday. I understand that incident response cannot be instantaneous, but hope that in the future the company is able to move faster on reissuing certificates when they are known to be compromised."
In related news, Microsoft released 12 security bulletins on Tuesday, nine of them rated critical, which resolve 71 vulnerabilities.
One of the more standout vulnerabilities is MS15-127, which fixes a flaw that could allow remote code execution if an attacker sends a specially crafted request to a DNS server.
The flaw is given an exploitability rank of 2 by Microsoft, meaning exploitation less likely, but they don't offer many details on the flaw itself other than to state that it's triggered by DNS requests. For organizations running a Microsoft DNS server exposed to the public, it might be worth including this patch alongside the other priority fixes this month – just to stay safe.
Rapid7's Adam Nowak also suggested MS15-124, MS15-125 and MS15-128 as bulletins to watch out for, as they address 33 vulnerabilities on their own.
"Since a wide range of products are affected this month almost all Microsoft users should be on alert. Microsoft's update addresses the vulnerabilities by resolving underlying issues with how certain functions in VBScript handle objects in memory, preventing cross site scripting (XSS) from incorrectly disabled HTML attributes, proper enforcement of content types and cross-domain policies," Nowak said.
Other patches released on Tuesday include fixes for more than 70 vulnerabilities from Adobe, and more than 50 from Apple on iOS, Safari, and Watch OS.