Live
- Social media doing harm to youngsters, calling time on it: Australian PM Albanese
- Gut microbiome changes may signal onset of rheumatoid arthritis
- Caste census, a historic benchmark in country: MLA Prakash
- Siddharth and Ashika Ranganath’s ‘Miss You’ Set for November 29 Release
- Cops return kidnapped woman within 24 hours
- IT Min lays foundation stone for Co-operative Central Bank building
- Abhishek Bachchan and Aishwarya Rai Divorce Rumors: Family Denies Affair with Nimrat Kaur
- MLA Naini Rajender lauds Comprehensive Family Survey
- State on mission mode to revive airport
- Anushka Shetty Takes on Her Boldest Role in ‘Ghaati.’ Watch the Teaser Now
Just In
CERT-In Issues Critical Alert for Microsoft Windows Users- Details
Indian government warns Microsoft Windows users of serious vulnerabilities that could allow attackers to gain elevated privileges.
The Indian government has issued an urgent warning to Microsoft Windows users, highlighting potential risks due to vulnerabilities in the operating system. The Indian Computer Emergency Response Team (CERT-In), part of the Ministry of Electronics and Information Technology, has flagged these issues, which could leave users' systems exposed to serious security threats.
These vulnerabilities specifically affect systems that utilize Virtualization Based Security (VBS) and Windows Backup. If successfully exploited, attackers could gain elevated privileges on the targeted system, enabling them to bypass security measures or reintroduce previously resolved issues. This could put sensitive data and personal information at significant risk.
The warning follows a recent global incident where Microsoft Windows users faced a major outage due to a faulty update from CrowdStrike. While such occurrences are rare, the government emphasizes the importance of staying vigilant and applying updates provided by trusted vendors to safeguard against potential exploitation.
CERT-In's alert is a crucial reminder for all Microsoft Windows users to ensure their systems are up-to-date and to follow best practices for cybersecurity. Ignoring these warnings could lead to serious consequences, including unauthorized access to critical system functions.
Mentioned below are the affected Microsoft Windows versions:
• Windows Server 2016 (Server Core installation)
• Windows Server 2016
• Windows 10 Version 1809 for ARM64-based Systems: Windows 10 Version 1809 for 32-it Systemstems
• Windows 10 Version 1607 for x64-based Systems
• Windows 10 Version 1607 for 32-bit Systems
• Windows 10 for x64-based Systems
• Windows 10 for 32-bit Systems
• Windows 11 version 21H2 for ARM64-based Systems
• Windows 11 version 21H2 for x64-based Systems
• Windows 10 Version 21H2 for x64-based Systems
• Windows 10 Version 21H2 for ARM64-based Systems
• Windows 10 Version 21H2 for 32-bit Systems
• Windows 10 Version 22H2 for 32-bit Systems
• Windows 10 Version 22H2 for ARM64-based Systems
• Windows 10 Version 22H2 for x64-based Systems
• Windows 11 Version 22H2 for x64-based Systems
• Windows 11 Version 22H2 for ARM64-based Systems
• Windows 11 Version 23H2 for x64-based Systems
• Windows 11 Version 23H2 for ARM64-based Systems
• Windows 11 Version 24H2 for x64-based Systems
• Windows 11 Version 24H2 for ARM64-based Systems
• Windows Server 2019 (Server Core installation)
• Windows Server 2019
• Windows Server 2022 (Server Core installation)
• Windows Server 2022
• Windows Server 2022, 23H2 Edition (Server Core installation)
© 2024 Hyderabad Media House Limited/The Hans India. All rights reserved. Powered by hocalwire.com