Microsoft's Windows security flaw is significant. What you can do about it is as follows.

 

Microsoft's Windows security flaw is significant. What you can do about it is as follows.

CNN Business reports that Microsoft's latest security flaw could have long-term consequences for both consumers and businesses at a time when many people around the world are already on high alert for disruptive cyber attacks.

Sangfor researchers recently discovered PrintNightmare, a Windows vulnerability that could allow hackers to remotely gain access to the operating system and install programs, view and delete data, or even create new user accounts with full user rights. The company inadvertently leaked instructions on how hackers could exploit the flaw.

Is my Windows device affected?

Microsoft (MSFT) is advising all Windows users to install an update that affects the Windows Print Spooler service, which allows multiple users to access the same printer. Microsoft has already released updates for Windows 10, Windows 8, Windows 7, and some server versions. Microsoft ended support for Windows 7 last year, so the decision to release an update for that software emphasizes the gravity of the situation.

According to Michela Menting, a cybersecurity expert at ABI Research, while many Windows users do not have remote access capabilities on their home computers, business computers or people working remotely and connecting back to the office could be the most affected.

What is the significance of this?

Windows 10 runs on about about 1.3 billion devices worldwide, according to market research firm CCS Insight, so the magnitude of the vulnerability's reach is massive. "This is a big deal because Windows 10 is the most popular desktop OS out there with over 75% market share," Menting said.

Because Windows 10 is used by both desktop computers and some servers, hackers could potentially infiltrate a network "very quickly" and get in "practically anywhere to find the most lucrative databases and systems," according to Menting.

Users copied Sangfor's proof-of-concept exploit code after he posted it on the Microsoft-owned code hosting platform Github.

How to Install the Patch

Windows users can download the new software by going to the Settings page, then selecting the Update & Security option, followed by Windows Update, or by going to the Microsoft website.

However, one researcher on Twitter demonstrated how the emergency update isn't completely effective, allowing potential actors to exploit the vulnerability. Following the publication of this story, a Microsoft spokesperson stated The company says it is "not aware of any bypasses to the update," but it is still looking into the matter.

Menting compared a buggy patch to "years in cybercrime time," adding that ransomware attacks or data theft are "highly likely" as a result. "There is no doubt that not every company will have updated their operating system before an attacker gets in," she said.

The main point

Nonetheless, the incident serves as a reminder to both businesses and consumers to regularly update any type of software to ensure that impacted systems are not left vulnerable. Menting advised anyone who believes they may be vulnerable to a vulnerability or is unsure to disable impacted functions until a company releases an official fix.

Comments

Popular posts from this blog

Update your Windows PC to address the serious Print Nightmare security vulnerability.

Which computers are capable of being upgraded to Windows 11?

Microsoft will prioritize the refresh of Win32 apps for Windows 11, Windows 10, and Windows 8.