Google Project Zero discloses 'important' security vulnerability in Windows 10

RoboMan

Level 35
Thread author
Verified
Top Poster
Content Creator
Well-known
Jun 24, 2016
2,485
win10-au-update3-start.jpg


The flaw in question is the second to be reported in a Microsoft product in the past week.

Google's Project Zero team has disclosed another Windows 10 security flaw after Microsoft failed to patch it within the standard timeframe of 90 days. As first spotted by Neowin, the bug is one of a pair that was initially reported to Microsoft in November. The company apparently fixed one of the bugs with its February Patch Tuesday fixes, but left the other untouched.

According to the Project Zero report, the flaw could allow an attacker to gain administrator privileges if exploited. The issue is listed as high severity by Google because of its ease of exploitation. However, it can't be exploited remotely, which caused Microsoft to categorize it as "important" rather than "critical." James Forshaw, the Google security researcher who reported the vulnerability, notes that it only affects Windows 10 and hasn't been verified to work on earlier versions, like Windows 7 or 8.1. It's unclear when Microsoft may release a fix for the issue in question.

This is the second flaw in a Microsoft product that Google's Project Zero team has made public in the past week. Last week, the team disclosed a vulnerability in Microsoft Edge after initially alerting Microsoft to the issue in November. According to the issue tracker, Microsoft stressed that a fix for that issue would be ready to ship in time for the March 13 Patch Tuesday.

Microsoft and Google have butted heads in the past over public disclosures of vulnerabilities. In November of 2016, Microsoft expressed frustrationover Google's public disclosure of a zero-day vulnerability 10 days after reporting it to Microsoft, before the company had a chance to release a patch. That followed a similar war of words between the two companies in 2015, when Google made a Windows 8.1 vulnerability public two days before a patch was to be released. The two bugs disclosed this week followed Project Zero's standard protocol of publicly disclosing vulnerabilities after 90 days.
 
D

Deleted member 65228

Patching vulnerabilities should be a priority regardless of whether it can be exploited remotely or not. Microsoft of all people should know that in-real-life attacks are possible, especially when it comes down to business systems in an enterprise environment.

There's a huge difference between actually caring about security of your customers and pretending to care about the security of your customers. I'd say Microsoft falls into the second category now.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top