Despite the success of the software giant Microsoft in lording it over operating systems in PCs and laptops, there are still many instances wherein security issues are overlooked. While before these were discovered by in house software engineers, the latest ones were discovered by third parties, often security firms seeking to tighten any breaches regarding the integrity of information carried in these operating systems.
The latest security flaw, codenamed ?Redirect to SMB?, is one such flaw which may have potentially opened floodgates for hackers and other spies to obtain vital and sensitive information of individuals and corporations using Microsoft as their operating systems in their PCs. In a report from RT.com, the security firm Cylance discovered the flaw. Unfortunately, it also discovered that at least 31 major companies such as Adobe, Oracle and Apple have been exploited with this weak spot.
The flaw affects all version of Windows, according to a report from darkreading.com. This flaw allows a hacker to obtain encrypted login credentials from Windows PC users. These attackers can gain entry through a compromised web server or through the control of network traffic and redirecting it to the SMB-based server. While in this server, all user credentials can then be copied and used.
The attack could be done in hours, where data can be stolen, or the PC be controlled or be used as a launch pad for other attacks on other parts of the machine?s network.
In response, Microsoft had issued 11 security bulletins specifically to address these remote code execution flaws. Four of these eleven bulletins were deemed critical patches and would address 26 vulnerabilities discovered. According to a report from networkworld.com, the MS15-033 security bulletin should be first addressed, as this corrects the zero-day vulnerability of MS Office. This is especially critical for MS Word 2007, MS Word 2010, MS Office 2010, MS Web Apps Server 2010, MS Word Viewer, MS Office Compatibility Pack and Word Automation Services on MS SharePoint Server 2010.
The full version of the MS security bulletins can be found on their website. It is urged that all take precautions to avoid critical information issues moving forward.