Patch Right Now – Microsoft Windows 10 and Server 2016/2019


Anyone running Windows 10, Windows Server 2016 and Windows Server 2019 is "strongly encouraged" to install Microsoft patch right now.
Microsoft January 2020 Patch Tuesday fixes 49 security bugs after the US National Security Agency (NSA) discovered a critical bug in the operating system. These 49 vulnerabilities, 7 are classified as Critical, 41 as Important, and 1 as Moderate.

Microsoft patched a spoofing vulnerability present in the Windows user-mode cryptographic library, CRYPT32.DLL, on Windows 10, Windows Server 2016, and Windows Server 2019 systems. The vulnerability could allow for remote code execution. In other words, allow hackers to compromise trusted network connections using spoofed certificates to deliver malicious executable code under the pretense of a legitimately trusted entity, commit man-in-the-middle attacks, and decrypt confidential information. For example, HTTPS connections, signed emails and files, and user-mode processes launching signed executable code.

To patch now, call now at (212) 868-0688 or email us at cs@mjjt.us

Note: Support for Windows Server 2008 R2, and Windows Server 2008 ends January 14, 2020. For more information, please use our contact form.

Comments

Popular posts from this blog

Emergency Patch Released for SMBv3 Vulnerability

Do you have one of Vulnerable to the Top 8 Most Exploited Vulnerabilities?

Windows 7 Extended Security Updates