Site icon WinCert

Microsoft patches Windows 10 Zero-Day vulnerability

<p>The last couple of weeks were marked by the flawed release of Windows 10 v1809 October Update&period; Microsoft was forced to pull the update due to a <a href&equals;"https&colon;&sol;&sol;www&period;wincert&period;net&sol;cast&sol;microsoft-stops-windows-10-v1809-rollout&sol;">major bug in the final release<&sol;a>&period;<&sol;p>&NewLine;<p><img class&equals;"alignnone wp-image-2783 size-full" src&equals;"https&colon;&sol;&sol;www&period;wincert&period;net&sol;wp-content&sol;uploads&sol;2018&sol;10&sol;hacker&lowbar;code&period;jpg" alt&equals;"zero-day" width&equals;"640" height&equals;"373" &sol;><&sol;p>&NewLine;<p>Along with this problem&comma; the company also had to solve other issues in Windows 10&comma; like Zero-Day vulnerability&period; A zero-day flaw in Windows 10 was initially reported by Kaspersky back in August&comma; who said that the flaw was exploited for targeted attacks in the Middle East&period;<&sol;p>&NewLine;<p>In its release notes published last week&comma; Microsoft gave more details regarding Elevation of Privilege Vulnerability &lpar;CVE-2018-8435&rpar;&period;<&sol;p>&NewLine;<blockquote><p><em>&OpenCurlyDoubleQuote;An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory&period; An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode&period; An attacker could then install programs&semi; view&comma; change&comma; or delete data&semi; or create new accounts with full user rights&period;<&sol;em><&sol;p>&NewLine;<p><em>To exploit this vulnerability&comma; an attacker would first have to log on to the system&period; An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system&period;<&sol;em><&sol;p>&NewLine;<p><em>The update addresses this vulnerability by correcting how Win32k handles objects in memory&period;”<&sol;em><&sol;p><&sol;blockquote>&NewLine;<p>According to Kaspersky&comma; the flaw has been used by the FruityArmor hacking group&period; Kaspersky also warned that the code of exploit is of high quality and aimed to reliably exploit as many Windows operating systems as possible&period;<&sol;p>&NewLine;<p>Windows consumers are advised to install this update as soon as possible&period;<&sol;p>&NewLine;

Exit mobile version