Microsoft has released an urgent patch for Windows after the US National Security Agency (NSA) discovered a critical bug in the operating system.
As part of its regular Patch Tuesday, the company issued a fix for the CVE-2020-0601 vulnerability and the NSA says that anyone running Windows 10, Windows Server 2016 or Windows Server 2019 is "strongly encouraged" to install the patch.
This is the first time the NSA has publicly taken credit for the discovery of a software vulnerability, and the agency notified Microsoft to enable it to work on a fix. It is not thought that the vulnerability has been exploited as yet, but now that details are out in the wild it is imperative that all available updates are installed to keep Windows secure.
- Clop ransomware looks to target Windows 10 apps
- That 'new Windows 10 update' could be packed with ransomware
- Microsoft once again sends out the wrong Windows 10 update to users
The problem exists in the Windows CryptoAPI (Crypt32.dll), and could enable an attacker to use fake security certificates to install malware under the guise of being valid software. Experts warn the vulnerability could also be exploited to attack networks.
In a tweet, the NSA advised Windows users about the bug and encouraged them to install the patch:
This #PatchTuesday you are strongly encouraged to implement the recently released CVE-2020-0601 patch immediately. https://t.co/czVrSdMwCR pic.twitter.com/log6OU93cVJanuary 14, 2020
Clearly the neither the NSA nor Microsoft want to give too many details about the vulnerability. It takes times for users to install patches and updates – particularly at a business level – so there is an understandable fear that attackers might try to take advantage of unpatched systems. Acknowledging that "sophisticated cyber actors will understand the underlying flaw very quickly", the NSA deems the vulnerability to be severe.
In an advisory notice posted online, the agency said that it "recommends installing all January 2020 Patch Tuesday patches as soon as possible to effectively mitigate the vulnerability on all Windows 10 and Windows Server 2016/2019 systems". For businesses and organisations with large numbers of computers to think about, the advice is to focus on patching the most vulnerable front-facing systems.
There's no time to waste, so make sure you check for updates right now so you have all of the latest patches installed. You can do this through Microsoft's website, or by clicking the Start button and navigating to Settings > Update & Security > Windows Update.
- Keep your PC safe with our guide to the best antivirus software