Cybersecurity Microsoft Finds Four Security Flaws in Windows 10 August 15, 2019

Lumia 950 running Windows 10 Mobile in Tokyo Japan

Microsoft Delivers Patch Tuesday Updates for Windows 10

Earlier this week, Microsoft released a patch for two major security flaws which it detected in the Windows Desktop Services package (RDS).

The "wormable" vulnerabilities, meaning that any future malware that exploits these could propagate from vulnerable computers without user interaction, were discovered while Microsoft was hardening its Remote Desktop Services as part of its regular security process.

In a post on its website Simon Pope, Director of Incident Response at the Microsoft Security Response Center (MSRC). explained: "Today Microsoft released a set of fixes for Remote Desktop Services that include two critical Remote Code Execution (RCE) vulnerabilities".

Microsoft Windows 10 update and monthly patch rolled out on Tuesday of this week, and you should update it as soon as possible.

Although Microsoft has yet to ascertain the number of devices affected by the newly discovered vulnerabilities, CVE-2019-1181 and CVE-2019-1182, it recommends immediate patching of these bugs to contain a potential wider attack. However, Windows Server 2003, Windows XP and Windows Server 2008 are not affected due to the flaws. All of these vulnerabilities share the same attack scenario where "an attacker can get code execution at system level by sending a specially crafted pre-authentication RDP packet to an affected RDS server", Childs noted.

Windows Protector shared the leading bestow F-Secure SAFE, Kaspersky Web Security, and Norton Security, however, Microsoft's software has a substantial benefit over those 3: it comes cost-free with Windows 10, while the others are paid-for choices.

This vulnerability now affects hundreds of millions of computers around the globe. Windows 10 is at risk of hacking over 80 million systems around the world.

However, it is important to note that for unpatched Windows devices to be exploited the attackers would have to first authenticate before taking control of the vulnerable system. Attackers can use them to create worms that spread like wildfire online.

The difference? "A subset of Insiders in the Slow ring will have features turned off by default, and another subset will have them turned on by default", wrote Dona Sarkar and Brandon LeBlanc, Microsoft employees and the public faces of Windows Insider. Of particular interest are two "wormable" remote code execution vulnerabilities which are particularly risky because they can spread without the user even lifting a finger.

Latest News