PacStates
Call Today:  (775) 828-2020
Call Today:  (775) 828-2020

Keeping Businesses Connected

Free Consultation

WARNING: Critical Vulnerabilities Identified in Windows OS

In a new report released by the Cybersecurity and Infrastructure Security Agency (CISA), organizations were urged to install critical systems patches recently released by Microsoft.

Three key vulnerabilities have been identified that could allow attackers to decrypt, modify or inject new data on user connections.

  1. A spoofing vulnerability in Windows CryptoAPI (Crypt32.dll)
  2. A remote code execution vulnerability in Windows Remote Desktop Server
  3. A remote code execution vulnerability in Windows Remote Desktop Client

Should patches for these vulnerabilities not be implemented, organizations risk a network intrusion. An intrusion could result in the temporary or permanent loss of sensitive or proprietary information, disruption of regular operations, financial losses relating to restoring files and systems, and potential harm to your organization’s reputation.

According to the official report, “The Cybersecurity and Infrastructure Security Agency (CISA) is unaware of active exploitation of these vulnerabilities. However, because patches have been publicly released, the underlying vulnerabilities can be reverse-engineered to create exploits that target unpatched systems. CISA strongly recommends organizations install these critical patches as soon as possible—prioritize patching by starting with mission critical systems, internet-facing systems, and networked servers.”

Is your software up to date? Do you have security measures in place to prevent cyber-attacks? PacStates can help! To learn more about how to prevent network intrusions, contact us today!

To read the full CISA report on Windows OS vulnerabilities, click here.

Comments are closed.

Phone:
(775) 828-2020
Dispatch or Service Inquiry:
(775) 828-2030
Fax:
(775) 284-2684
Follow Us:
Directions

Have a question?

Designed & Created by Pegasus Online