Windows 10 security bug leaves your PC vulnerable to attack: here's how to patch it
Cryptographic flaw could let an attacker control your PC
Microsoft has released an urgent patch for Windows after the US National Security Agency (NSA) discovered a critical bug in the operating system.
As part of its regular Patch Tuesday, the company issued a fix for the CVE-2020-0601 vulnerability and the NSA says that anyone running Windows 10, Windows Server 2016 or Windows Server 2019 is "strongly encouraged" to install the patch.
This is the first time the NSA has publicly taken credit for the discovery of a software vulnerability, and the agency notified Microsoft to enable it to work on a fix. It is not thought that the vulnerability has been exploited as yet, but now that details are out in the wild it is imperative that all available updates are installed to keep Windows secure.
- Clop ransomware looks to target Windows 10 apps
- That 'new Windows 10 update' could be packed with ransomware
- Microsoft once again sends out the wrong Windows 10 update to users
The problem exists in the Windows CryptoAPI (Crypt32.dll), and could enable an attacker to use fake security certificates to install malware under the guise of being valid software. Experts warn the vulnerability could also be exploited to attack networks.
In a tweet, the NSA advised Windows users about the bug and encouraged them to install the patch:
This #PatchTuesday you are strongly encouraged to implement the recently released CVE-2020-0601 patch immediately. https://t.co/czVrSdMwCR pic.twitter.com/log6OU93cVJanuary 14, 2020
Get patched
Clearly the neither the NSA nor Microsoft want to give too many details about the vulnerability. It takes times for users to install patches and updates – particularly at a business level – so there is an understandable fear that attackers might try to take advantage of unpatched systems. Acknowledging that "sophisticated cyber actors will understand the underlying flaw very quickly", the NSA deems the vulnerability to be severe.
In an advisory notice posted online, the agency said that it "recommends installing all January 2020 Patch Tuesday patches as soon as possible to effectively mitigate the vulnerability on all Windows 10 and Windows Server 2016/2019 systems". For businesses and organisations with large numbers of computers to think about, the advice is to focus on patching the most vulnerable front-facing systems.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
There's no time to waste, so make sure you check for updates right now so you have all of the latest patches installed. You can do this through Microsoft's website, or by clicking the Start button and navigating to Settings > Update & Security > Windows Update.
- Keep your PC safe with our guide to the best antivirus software
Sofia is a tech journalist who's been writing about software, hardware and the web for nearly 25 years – but still looks as youthful as ever! After years writing for magazines, her life moved online and remains fueled by technology, music and nature.
Having written for websites and magazines since 2000, producing a wide range of reviews, guides, tutorials, brochures, newsletters and more, she continues to write for diverse audiences, from computing newbies to advanced users and business clients. Always willing to try something new, she loves sharing new discoveries with others.
Sofia lives and breathes Windows, Android, iOS, macOS and just about anything with a power button, but her particular areas of interest include security, tweaking and privacy. Her other loves include walking, music, her two Malamutes and, of course, her wife and daughter.