Microsoft Releases Major Security Update to Patch Over 100 Windows Vulnerabilities

Byteswift digital
By -
0
Microsoft Releases Major Security Update to Patch Over 100 Windows Vulnerabilities

Microsoft recently disclosed and released patches for a substantial number of security vulnerabilities impacting various versions of the Windows operating system. After closely evaluating reports submitted through its coordinated vulnerability disclosure program, the company published details on over 100 proven issues requiring remedy.

In an official security update guide published to its support website, Microsoft revealed it had addressed 45 unique vulnerabilities permitting malicious remote code execution on affected Windows devices without authorization. This allows an attacker full access to an unpatched system from afar. Of especially high risk are 12 vulnerabilities rated critical, which if exploited, could enable complete compromise of the targeted computer.

In addition to closing flaws pave way for remote takeover, the update also fixes 26 privilege escalation vulnerabilities. These issues posed a serious threat by enabling unauthorized elevation of user rights levels within Windows. Successful exploitation could have granted cybercriminals enhanced privileges to manipulate and disrupt protected operating system functions. 

Other corrected vulnerabilities included 17 denial of service problems that may have allowed systems to crash orreboot under specific conditions. One noteworthy vulnerability patched was assigned the identifier CVE-2023-41763, impacting Skype for Business capability permissions architecture. WordPad document parsing was also shored up against the flaw tracked as CVE-2023-36563.

With over 100 bugs mitigated through this public release, it is strongly recommended all Windows users apply the security update without delay. Prompt patching will close avenues exploited by online threats seeking to infiltrate or disrupt personal and enterprise computers through the remediated vulnerabilities.

Post a Comment

0Comments

Post a Comment (0)