Windows users, government has a warning for you – Times of India
Indian Computer Emergency Response Team (CERT-IN) issued a warning for some versions of Microsoft Windows. The security issue isn’t directly related to the operating system, instead, it has affected the Windows Defender, the tool responsible for keeping the operating system secure from malware, viruses, etc.
The government body has marked the security risk as ‘high severity’ and has mentioned that “Privilege escalation and security bypass vulnerabilities in Windows Defender Credential Guard has been found.
For those unintended, CERT-IN is a nodal agency under the Ministry of Electronics and Information Technology. The government body is responsible for highlighting bugs and cybersecurity threats like phishing and hacking.
What the government has said about Windows Defender’s new vulnerability
CERT-IN has noted that these vulnerabilities in Windows Defender Credential Guard can allow a local authenticator attacker to bypass the security restrictions and gain access to the targeted system.
What’s the reason behind this vulnerability
According to CERT-IN, the issue in Windows Defender exists because of a flaw in the Credential Guard component of the tool. If hackers can successfully exploit this vulnerability can access the targeted system.
Who all are affected
According to the official post, both Windows 11 and Windows 10 users are affected. Here’s a complete list of all the Windows versions that are affected by the Defender vulnerability
The government body has marked the security risk as ‘high severity’ and has mentioned that “Privilege escalation and security bypass vulnerabilities in Windows Defender Credential Guard has been found.
For those unintended, CERT-IN is a nodal agency under the Ministry of Electronics and Information Technology. The government body is responsible for highlighting bugs and cybersecurity threats like phishing and hacking.
What the government has said about Windows Defender’s new vulnerability
CERT-IN has noted that these vulnerabilities in Windows Defender Credential Guard can allow a local authenticator attacker to bypass the security restrictions and gain access to the targeted system.
What’s the reason behind this vulnerability
According to CERT-IN, the issue in Windows Defender exists because of a flaw in the Credential Guard component of the tool. If hackers can successfully exploit this vulnerability can access the targeted system.
Who all are affected
According to the official post, both Windows 11 and Windows 10 users are affected. Here’s a complete list of all the Windows versions that are affected by the Defender vulnerability
- Windows 11 for ARM64-based systems
- Windows 11 for x64-based systems
- Windows 10 Version 1607 for x64-based systems • Windows 10 Version 1607 for 32-bit systems
- Windows 10 for x64-based systems
- Windows 10 for 32-bit systems
- Windows • Windows 10 Version 21H2 for x64-based systems
- Windows 10 Version 21H2 for ARM64-based systems
- Windows 10 Version 21H2 for 32-bit systems
- Windows 10 Version 20H2 for ARM64-based systems
- Windows 10 Version 20H2 for 32-bit • Windows 10 Version 20H2 for x64-based systems
- Windows 10 Version 21H1 for 32-bit systems
- Windows 10 Version 21H1 for ARM64-based systems • Windows 10 Version 21H1 for x64-based systems
- Windows 10 Version 1809 for ARM64-based systems
- Windows 10 Version 1809 for x64-based systems • Windows 10 Version 1809 for 32-bit systems
- Windows Server 2022 (Server Core installation) Windows Server 2022
- Windows Server 2019 (Server Core installation) • Windows Server 2019 Windows Server 2016 (Server Core installation)
- Windows Server 2016
- Windows Server, version 20H2 (Server Core Installation)
What users can do
The government has advised users to install the appropriate patch for the Defender mentioned in Microsoft Security Bulletin.
For all the latest Technology News Click Here
For the latest news and updates, follow us on Google News.
Denial of responsibility! TechNewsBoy.com is an automatic aggregator around the global media. All the content are available free on Internet. We have just arranged it in one platform for educational purpose only. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, all materials to their authors. If you are the owner of the content and do not want us to publish your materials on our website, please contact us by email – [email protected]. The content will be deleted within 24 hours.