Home TechnologyComputers & Related Microsoft Fixes Major Windows Defender Problem Reported by Researchers from Google

Microsoft Fixes Major Windows Defender Problem Reported by Researchers from Google

Earlier this weekend, Tavis Ormandy and Natalie Silvanovich announced on Twitter that the built-in Windows Defender has some serious flaws as the defender could leave the system vulnerable to remote attacks.

After Tavis Ormandy turned to Twitter to reveal the findings, other security experts responded that they previously reported the issue to Microsoft.

Earlier today, Microsoft rolled out an update that contains fix for the problem as the report noted,

An attacker who successfully exploited this vulnerability could execute arbitrary code in the security context of the LocalSystem account and take control of the system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

To exploit this vulnerability, a specially crafted file must be scanned by an affected version of the Microsoft Malware Protection Engine. There are many ways that an attacker could place a specially crafted file in a location that is scanned by the Microsoft Malware Protection Engine. For example, an attacker could use a website to deliver a specially crafted file to the victim’s system that is scanned when the website is viewed by the user. An attacker could also deliver a specially crafted file via an email message or in an Instant Messenger message that is scanned when the file is opened. In addition, an attacker could take advantage of websites that accept or host user-provided content, to upload a specially crafted file to a shared location that is scanned by the Malware Protection Engine running on the hosting server.

If the affected antimalware software has real-time protection turned on, the Microsoft Malware Protection Engine will scan files automatically, leading to exploitation of the vulnerability when the specially crafted file scanned. If real-time scanning is not enabled, the attacker would need to wait until a scheduled scan occurs in order for the vulnerability to be exploited. All systems running an affected version of antimalware software are primarily at risk.

The company also revealed that users will receive the update in the next two days. If you want to get the update as soon as you can, then you can check for updates manually and continue with the procedure to avoid the potential security threats.

Related Articles