Patch your Windows 10 boxes.
2020-01-16 06:01 pm![[personal profile]](https://www.dreamwidth.org/img/silk/identity/user.png)
If your Windows 10 boxes -- all of them, both desktops and servers, didn't apply the update that came out Tuesday, go do that now. You can chase the references below while the update is downloading.
Here's what Microsoft said about it when they released the patch. There are more details in the resource list below. Some of those go on to link to proof-of-concept exploits. Good luck!
h/t to @thnidu.
Resources
- NVD - CVE-2020-0601
- Windows 10 Has a Security Flaw So Severe the NSA Disclosed It | WIRED
- CVE-2020-0601 | Windows CryptoAPI Spoofing Vulnerability
- January 2020 Security Updates: CVE-2020-0601 - Microsoft Security Response Center
- CVE-2020-0601: a critical Windows vulnerability discovered by…NSA!
Another fine post from
The Computer Curmudgeon (also at
computer-curmudgeon.com).
Donation buttons in profile.
no subject
Date: 2020-01-18 04:41 pm (UTC)no subject
Date: 2020-01-18 05:33 pm (UTC)(Probably wouldn't be necessary if I wasn't using Linux and xmonad.)
Suspend is actually flakier; if I disconnect anything while the box is in the middle of suspending there's a good chance it will crash. Or fail to suspend, in which case it will be sitting in my backpack cooking itself.
no subject
Date: 2020-01-18 05:40 pm (UTC)