Windows Defender Exploit Information

Last night an exploit was discovered that affects the anti-malware engine used by several Microsoft Security applications. It has been called the “the worst Windows remote code exec in recent memory.”

You can read more about the vulnerability and the risks associated with it here:

http://www.infoworld.com/article/3194763/endpoint-protection/microsoft-rushes-emergency-fix-for-critical-antivirus-bug.html

http://www.zdnet.com/article/microsoft-releases-emergency-patch-for-crazy-bad-windows-zero-day-bug/

https://www.engadget.com/2017/05/08/microsoft-windows-malware-protection-engine-rce/

 

While these applications are installed on all machines, Xlingshot utilizes other software to protect your computers, email and data. However, based on the severity of the exploit we are going to be deploying the update as soon as it’s available from Microsoft. This update could require a reboot.

While our goal is to set a reboot schedule with minimal impact to your business, system security is our top priority and we’ll be applying the fix as soon as possible.

We will continue to send notices via the Xlingshot Companion.  If you have any questions, please submit a Help Desk ticket via the Companion.

For more information, please contact us.

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *