Microsoft Addresses Security Flaws in Windows Update, Disables Controversial Recall Feature

ICARO Media Group
Politics
12/06/2024 19h46

Microsoft has released a set of updates addressing over 50 security vulnerabilities in Windows and related software. The software giant also responded to negative feedback regarding its new feature called Recall, which has been disabled by default on its Copilot+ PCs.

Last month, Microsoft unveiled Copilot+ PCs, featuring an AI-enabled version of Windows that included the Recall feature. However, Recall faced criticism from security experts who raised concerns about its potential as a keylogger and the risks it posed if a user's PC became compromised with malware.

Microsoft had previously argued that Recall snapshots remained on the user's system and couldn't be exfiltrated even in the event of a hack. However, these claims were challenged by former Microsoft threat analyst Kevin Beaumont, who revealed that any user, including non-administrators, could export Recall data stored locally in an SQLite database.

Critics argued that the indexed screenshots created by Recall could be valuable to attackers trying to understand unfamiliar systems quickly. Microsoft responded to the backlash by announcing that Recall would no longer be enabled by default on Copilot+ PCs.

Among the security updates, Microsoft flagged one specific vulnerability, CVE-2004-30080, as critical. This flaw in the Microsoft Message Queuing (MSMQ) service potentially allowed attackers to remotely take control of a user's system without any interaction. Users were advised to disable the vulnerable component if unable to install the update immediately.

Another vulnerability, CVE-2024-30078, was identified in the Windows WiFi Driver, also deemed critical. Exploiting this flaw required the attacker to be on the same local network, compromising unauthenticated users on the network.

Furthermore, Microsoft addressed multiple security issues in its Office applications, including at least two remote-code execution vulnerabilities.

The security community welcomed these updates but stressed the importance of prompt patching. Kevin Breen, Senior Director of Threat Research at Immersive Labs, highlighted the vulnerability present in the MSMQ service, emphasizing the need to patch quickly since several potentially internet-facing MSMQ servers could be targeted by zero-day attacks if left unpatched.

In addition to Microsoft's updates, Adobe also issued security patches for various products such as Acrobat, ColdFusion, and Photoshop.

Windows administrators have been advised to monitor the SANS Internet Storm Center, which provides detailed information on the severity, exploitability, and urgency of each patch. Additionally, AskWoody.com is a valuable resource for early reports on any issues with Windows patches.

With these comprehensive security updates, Microsoft aims to enhance the protection and resilience of its Windows ecosystem.

[Note: This article is based on the information provided, and no specific mentions of numbers or dates were included.]

The views expressed in this article do not reflect the opinion of ICARO, or any of its affiliates.

Related