The flaw was spotted in advanced Task Scheduler settings. This vulnerability allows hackers to get complete administrative privileges over your files. A researcher named SandboxEscaper first spotted the vulnerability and posted it online. The researcher took it to Github and posted the zero-day vulnerability on the platform. As of now, Microsoft didn’t acknowledge the security flaw within the Task Scheduler. Once the company acknowledges the bug, a security patch will be available very soon. Surprisingly, a Twitter user revealed the zero-day vulnerability targets those Windows 10 system that recently installed Windows 10 v1903. Furthermore, the user stated that anyone can easily exploit the vulnerability.
— Will Dormann (@wdormann) May 21, 2019 SandboxEscaper also released a video to demonstrate the proof-of-concept (POC) attack.
— Chase Dardaman (@CharlesDardaman) May 21, 2019 Notably, the researcher further claims to identify 4 additional flaws in the Windows 10 OS. One of these vulnerabilities allows the exploiter to bypass the security of sandbox. Microsoft needs to act fast and patch this vulnerability before it causes some serious damage. SandboxEscaper previously spotted several zero-day vulnerabilities. However, the user never informed Microsoft about the issues before releasing them. Reddit users wanted her to first notify Microsoft about the issues. As far as the recent vulnerability is concerned, Microsoft is expected to release the necessary patches on Patch Tuesday. RELATED ARTICLES YOU NEED TO CHECK OUT:
Yet another Windows zero-day vulnerability found by Kaspersky 5 of the best antivirus with website blocker/ web filtering
Name *
Email *
Commenting as . Not you?
Save information for future comments
Comment
Δ