Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Share Post: Reddit Facebook
Microsoft warns of major WannaCry-like Windows security exploit, releases XP patches
#1
Quote:Windows 10 and Windows 8 are safe

Microsoft is warning users of older versions of Windows to urgently apply a Windows Update today to protect against a potential widespread attack. The software giant has patched a critical remote code execution vulnerability in Remote Desktop Services that exists in Windows XP, Windows 7, and server versions like Windows Server 2003, Windows Server 2008 R2, and Windows Server 2008. Microsoft is taking the highly unusual approach of releasing patches for Windows XP and Windows Server 2003 even though both operating systems are out of support. Windows XP users will have to manually download the update from Microsoft’s update catalog.

“This vulnerability is pre-authentication and requires no user interaction,” explains Simon Pope, director of incident response at Microsoft’s Security Response Center. “In other words, the vulnerability is ‘wormable’, meaning that any future malware that exploits this vulnerability could propagate from vulnerable computer to vulnerable computer in a similar way as the WannaCry malware spread across the globe in 2017.”

READ THE FULL ARTICLE HERE
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Ransomware gang uses new Microsoft Exchange exploit to breach servers tarekma7 0 580 12-21-2022 , 09:00 AM
Last Post: tarekma7
  Microsoft Edge gets better security defaults on less popular sites tarekma7 0 737 08-08-2022 , 10:36 AM
Last Post: tarekma7
  Google Patches 48 Vulnerabilities With First Set of 2022 Android Updates mrtrout 0 538 01-06-2022 , 12:48 AM
Last Post: mrtrout
  Hackers exploit Microsoft MSHTML bug to steal Google, Instagram creds mrtrout 0 1,019 11-25-2021 , 02:58 PM
Last Post: mrtrout
  AV-Comparatives releases list of working consumer AV programs for Windows 11 mrtrout 0 609 10-20-2021 , 10:00 PM
Last Post: mrtrout

Forum Jump:


Users browsing this thread: 1 Guest(s)