Advertisment

Critical Software Vulnerabilities Found in Microsoft, Chrome and Apple

Cybersecurity Crisis Looms: CERT-In has issued a critical alert about flaws found in Microsoft Windows, Google Chrome, Oracle software, and Apple devices. Protect yourself and your data by updating all software immediately. Cybersecurity threat alert.

author-image
Aanchal Ghatak
New Update
Microsoft

The Indian Computer Emergency Response Team, CERT-In, has issued an important advisory for Windows users across the country. This warning involves multiple vulnerabilities found in various versions of Microsoft Windows, which pose a potential threat to system security and integrity of data.

Advertisment

A critical cybersecurity threat has emerged of critical vulnerabilities in software systems, most notably in Microsoft Windows, Google Chrome, Oracle products, and Apple devices. The aforesaid flaws are most likely to expose individuals and organizations across the world to data breaches, system compromises, and consequently huge financial losses.

Microsoft Windows Under Siege

The more immediate concerns are regarding Microsoft Windows users, with CERT-In issuing a high-severity alert on multiple vulnerabilities existing in different versions of the OS. This can give attackers unauthorized access to sensitive data and may even result in system compromise. While Microsoft is working on releasing patches, the agency has strongly advised users to adopt immediate countermeasures like enabling firewalls, updating antivirus software, and exercising caution with suspicious emails and links.

Advertisment

Overview of the Vulnerabilities

These vulnerabilities are majorly located in Windows systems with Virtualisation-Based Security and Windows Backup features. The flaws have been detected in a very long list of Windows versions, including:

Windows 10: Versions 1607, 21H2, 22H2, and 1809 across 32-bit, x64, and ARM64-based systems.

Windows 11: Versions 21H2, 22H2, and 24H2 for x64 and ARM64-based systems.

Windows Server: Windows Server 2016, 2019, 2022, including Server Core installations.

Advertisment

According to CERT-In, these vulnerabilities have the potential to allow attackers elevated privileges on the targeted systems. Herein, attacks could open ways for attackers to bypass security features like VBS or reintroduce earlier mitigated issues that open unauthorized access to highly sensitive system components and sensitive data.

Immediate Action Required

Since Microsoft has not released patches for these vulnerabilities, the following precautionary measures may be taken as advised by CERT-In:

Advertisment

Switch On Firewalls and Antivirus Software: Ensure that the firewall on your system is on, and that antivirus software is up to date. These can detect and block known malicious activity targeting these vulnerabilities.

Be Careful with Emails and Links: Cybercriminals are very likely to use phishing emails and malicious links to exploit such vulnerabilities. Be wary of opening e-mails from unknown sender; do not open suspicious links or download any unexpected attachments.

Disable Unused Features: Switch off features like Virtualization-Based Security or Windows Backup if you are not utilizing them. This will minimize the attack surface until security patches are available.

Advertisment

Regular Backups: Ensure you have valid and up-to-date backups for all your critical data. In the case of a successful attack, a backup may be used to enable fast recovery.

Stay current: Monitor Microsoft and CERT-In for security updates. When security patches are available, the deployment should not waste any time to keep the systems safe.

Wide-spread Threat Beyond Windows

Advertisment

The cyber security crisis does not stay within the bounds of Microsoft; it has been identified that flaws are also found in Google Chrome, Oracle software, and Apple products. These vulnerabilities may allow hackers to run malicious code, conduct identity theft, and bypass security. Users of these services should be on high alert and update as soon as possible with the available updates to these services, as well as watching out for phishing attacks and other threats on the internet.

High-Risk Vulnerabilities in Google Chrome

Apart from Windows, CERT-In has also raised red flags over several high-risk vulnerabilities in Google Chrome, specifically in versions prior to 127.0.6533.99/.100 on Windows, Mac, and Linux platforms. According to experts, these vulnerabilities may let a remote attacker execute arbitrary code on the targeted system; hence, they are very dangerous to users.

Advertisment

These vulnerabilities include heap buffer overflows in Layout, out-of-bounds access to memory in ANGLE, and use-after-free flaws in the WebAudio and Sharing components. Users are advised to apply the most recent updates available by Google to mitigate such risks.

Oracle and Apple: Critical Updates Required

It is the growing cybersecurity concerns that spare no products from Oracle and Apple. According to CERT-In, there are vulnerabilities in Oracle's software, which may allow unauthorized access and a data breach. Apple users will not be spared also, as multiple vulnerabilities were reported on iOS, macOS, watchOS, and other Apple platforms, which, if exploited, may allow attackers to execute arbitrary code, access sensitive information, or bypass security restrictions.

Apple users in India are urged to update their devices immediately due to critical security vulnerabilities identified by CERT-In. These flaws could expose personal data, allow unauthorized access, or disrupt device functionality. Protect yourself by installing the latest software updates for your iPhone, iPad, Mac, and other Apple products.

Urgent Call to Action

The more complex the digital world becomes, the greater the need for robust cybersecurity. This includes updating software, strong passwords, and remaining vigilant against strange website behavior. To combat such risks and safeguard vital infrastructure, collaboration must occur among cybersecurity agencies, technology companies, and users themselves.

According to CERT-In, we can mitigate these dangers by keeping ourselves updated on the changing landscape of threats and following the best practices of security recommended. We all need to act collectively to save ourselves from cyber attacks and make our digital world safe.

Advertisment