Teller Report

Now you can see non-English news...

"Microsoft" presents a security update to address 49 holes in "Windows 10"

2020-01-16T22:13:11.957Z

The company "Microsoft" has proposed a new security update, including solutions and corrections to address 49 vulnerabilities and security vulnerabilities, for the various versions of the operating system "Windows 10", which works on desktop and laptop computers and servers, as it turns out that one vulnerability is high



The company "Microsoft" has proposed a new security update, including solutions and corrections to address 49 vulnerabilities and security vulnerabilities, for the various versions of the operating system "Windows 10", which works on desktop and laptop computers and servers, as it turns out that one vulnerability is very dangerous and critical, while it was Eight vulnerabilities and vulnerabilities were classified as hazardous, while 40 were classified in the important vulnerabilities and vulnerabilities category.

Microsoft advised all users to urgently download, install and run the new security patch, to avoid being exposed to security attacks by exploiting those vulnerabilities.

Security updates

This came in the periodic security directive published by «Microsoft», according to the schedule of security updates for the system «Windows 10», which usually appears on the section on security directives related to the same system on the official website of the company.

The last directive was titled «January 2020 security updates for Windows 10 operating system», and it contained a detailed table and vulnerabilities that the new update addresses, as the table includes the name of the vulnerability, the degree of its seriousness and the version of “Windows 10” in which it is found, the date of its discovery, the type of attacks and security threats Through which.

Discovered vulnerabilities

To that, a review conducted by «Emirates Today» of the table contained in the security directive, that the set of vulnerabilities and vulnerabilities discovered belong to a category of vulnerabilities called «CVE-2020-0601», which is found in both version (No. 1803) of the operating system Windows 10 (32-bit), version (No. 1802) for Windows 10 systems based on X64 architecture, version 1802 of Windows 10 in the base servers category, and version 1803 for systems based AMM 64-bit architecture.

The presence of this set of loopholes was found in copies of version (1809) of "Windows 10", which works on a "32-bit" architecture, "x64-bit" architecture, and "ARM 64-bit" architecture, in addition to the copies intended for operating servers. And on the basic server install tools.

It was also found in copies of the version (1709) of "Windows 10", which is based on the "x64" architecture, and "ARM 64-bit" architecture, as well as in copies of the version (1903) of "Windows 10", based on the "32" architecture. Bit, X64 Bit Architecture, ARM 64 Bit Architecture.

The most dangerous gap

The severity and threat levels involved in the discovered vulnerabilities and vulnerabilities varied, the most serious of which was a vulnerability or vulnerability that information experts at the National Security Agency discovered, and reported to Microsoft. This vulnerability can be exploited by criminals and attackers who discover it to launch security attacks of the kind known as a "man in the middle." The simplest definition of this attack is that if there were two parties linked via an information network, and their devices operate with the operating system "Windows 10", and the first party wanted to communicate with the second party, the attacker would take advantage of this gap to stand in the middle between the two parties, so he would transmit to them both false messages, as A message arriving to him from the other party, to get through it all the sensitive personal data of the user, transmitted via the Internet, including registration and login data. It is also possible through this vulnerability that the attacker can, in the manner of "a man in the middle", replace the digital certificates used by those involved in the conversation, and prevent their browsers from warning them if the sites they visit are deceptive, and this type of attack is usually carried out over wireless communication networks Unlocked, through controlled "router" data routers, or even through a higher level in the network.

Source: emara

You may like

Tech/Game 2020-02-05T17:43:28.062Z

Trends 24h

Latest

tech 2020/02/20    

© Communities 2019 - Privacy