Microsoft's Windows security flaw is significant. What you can do about it is as follows.
Microsoft's Windows security flaw is significant. What you can do about it is as follows.
Sangfor researchers recently
discovered PrintNightmare, a Windows vulnerability that could allow hackers to remotely
gain access to the operating system and install programs, view and delete data,
or even create new user accounts with full user rights. The company
inadvertently leaked instructions on how hackers could exploit the flaw.
Is my Windows device affected?
Microsoft (MSFT) is advising all
Windows users to install an update that affects the Windows Print Spooler
service, which allows multiple users to access the same printer. Microsoft has
already released updates for Windows 10, Windows 8, Windows 7, and some server
versions. Microsoft ended support for Windows 7 last year, so the decision to
release an update for that software emphasizes the gravity of the situation.
According to Michela Menting, a
cybersecurity expert at ABI Research, while many Windows users do not have
remote access capabilities on their home computers, business computers or
people working remotely and connecting back to the office could be the most
affected.
What is the significance of this?
Windows
10 runs on about about 1.3 billion devices worldwide, according to market
research firm CCS Insight, so the magnitude of the vulnerability's reach is
massive. "This is a big deal because Windows 10 is the most popular
desktop OS out there with over 75% market share," Menting said.
Because Windows 10 is used by both
desktop computers and some servers, hackers could potentially infiltrate a
network "very quickly" and get in "practically anywhere to find
the most lucrative databases and systems," according to Menting.
Users copied Sangfor's
proof-of-concept exploit code after he posted it on the Microsoft-owned code
hosting platform Github.
How to Install the Patch
Windows users can download the new
software by going to the Settings page, then selecting the Update &
Security option, followed by Windows Update, or by going to the Microsoft
website.
However, one researcher on Twitter
demonstrated how the emergency update isn't completely effective, allowing
potential actors to exploit the vulnerability. Following the publication of
this story, a Microsoft spokesperson stated The company says it is "not aware
of any bypasses to the update," but it is still looking into the matter.
Menting compared a buggy patch to
"years in cybercrime time," adding that ransomware attacks or data
theft are "highly likely" as a result. "There is no doubt that
not every company will have updated their operating system before an attacker
gets in," she said.
The main point
Nonetheless, the incident serves as a
reminder to both businesses and consumers to regularly update any type of
software to ensure that impacted systems are not left vulnerable. Menting
advised anyone who believes they may be vulnerable to a vulnerability or is
unsure to disable impacted functions until a company releases an official fix.
Comments
Post a Comment