Microsoft has rolled out the Windows 10 February security patch on Tuesday, which contains fixes to dozens of vulnerabilities including a zero-day in Internet Explorer that could enable remote code execution.
In addition to the OS, the security update includes fixes for Microsoft Edge (EdgeHTML-based), Edge (Chromium-based), ChakraCore, Internet Explorer, Microsoft Exchange Server, Microsoft SQL Server, Microsoft Office, Office services and web apps, Windows malicious software removal tool and Windows Surface hub, among several others.
The OS update includes improvements to storing and managing files, improvements to the security of Microsoft Office products and when external devices such as webcams or gaming controllers are connected.
In addition to the ones mentioned above, the patch also includes security updates to Windows Graphics, Windows Input and Composition, Windows Media, Windows Shell, Windows Fundamentals, Windows Cryptography, Windows Hyper-V, Windows Peripherals, Windows Network Security and Containers, Windows Storage and Filesystems, the Microsoft Graphics Component, Windows Core Networking, and Windows Server.
Last month, a day after Microsoft ended support for Windows 7, they released a patch to address a security vulnerability, CVE-2020-0601, in the core cryptographic component of the Windows. According to the company, the vulnerability existed in the Crypt32.dll Windows component, which is responsible for implementing cryptographic messaging and certification functions in the OS. The vulnerability could enable hackers to sign malicious codes and make them appear as trusted sources via the code signing component.
You can check out more details on security updates and improvements for OS Build 10240.18486 here and OS Build 17763.1039 here. You can also read the complete February 2020 security updates release notes here.
Writes news mostly and edits almost everything at Candid.Technology. He loves taking trips on his bikes or chugging beers as Manchester United battle rivals.
Contact Prayank via email: [email protected]