Home Security Microsoft Patched A Zero-Click TCP/IP RCE Flaw

Microsoft Patched A Zero-Click TCP/IP RCE Flaw

by
0 comment
Latest Hacking News

From the ~100 safety fixes launched this month by Microsoft, a crucial vulnerability additionally obtained a repair, for which a researcher alerted customers. Particularly, Microsoft patched a zero-click TCP/IP flaw that would permit unauthenticated distant code execution assaults.

Researcher Alerts Microsoft Customers About The Zero-Click on TCP/IP RCE Flaw

Safety researcher XiaoWei from Kunlun Lab lately highlighted a critical safety vulnerability that Microsoft has simply patched.

As talked about in Wei’s X post, a distant code execution vulnerability affected the TCP/IP module in Home windows programs. The vulnerability caught the researcher’s consideration ‘a number of months in the past’, after which Wei responsibly disclosed the flaw to Microsoft.

Following Wei’s report, Microsoft addressed the vulnerability, releasing the patch with the August 2024 Patch Tuesday updates.

Whereas this Patch Tuesday is already vital for customers, contemplating it addressed ten zero-days, the patch for 9 crucial vulnerabilities, together with this TCP/IP flaw, makes it much more essential for them to use instantly.

Microsoft recognized this vulnerability as CVE-2024-38063, which obtained a crucial severity score and a CVSS rating of 9.8. Describing this vulnerability, Microsoft’s advisory reads,

An unauthenticated attacker may repeatedly ship IPv6 packets, that embrace specifically crafted packets, to a Home windows machine which may allow distant code execution.

From the outline, it’s clear that the vulnerability sometimes targets IPv6-enabled programs. It’s a critical matter, on condition that IPv6 comes enabled by default within the newest Home windows 11. Which means this safety situation predominantly threatens the most recent Home windows programs, whereas the older programs with unsupported or disabled IPv6 remained unaffected.

See also  Hi-Fi Rush studio saved from Microsoft shutdown

How To Examine/Allow/Disable IPv6 On Home windows (10/11)

Though Microsoft doesn’t suggest disabling IPv6, customers should know that IPv6 isn’t usually supported but, notably for older units.

Therefore, whereas an lively IPv6 is perhaps helpful in some instances, it’s protected to disable IPv6 on programs in different conditions, resembling when utilizing a VPN that doesn’t support IPv6, or to forestall exploitation of vulnerabilities like CVE-2024-38063.

Home windows 10 and 11 customers might observe this path to verify IPv6 standing on their gadget: Management PanelNetwork and InternetNetwork Connections. Then, right-click on the lively community connection icon and go to ‘Properties.’ Subsequent, verify or uncheck the “Web Protocol Model 6 (TCP/IPv6)” choice to allow or disable IPv6.

Tell us your ideas within the feedback.

Source link

You may also like

cbn (2)

Discover the latest in tech and cyber news. Stay informed on cybersecurity threats, innovations, and industry trends with our comprehensive coverage. Dive into the ever-evolving world of technology with us.

© 2024 cyberbeatnews.com – All Rights Reserved.