close
    • chevron_right

      Windows 11 encryption bug could cause data loss, temporary slowdowns on newer PCs

      news.movim.eu / ArsTechnica · Tuesday, 9 August, 2022 - 17:31 · 1 minute

    Windows 11 encryption bug could cause data loss, temporary slowdowns on newer PCs

    Enlarge (credit: Microsoft)

    Microsoft has published a knowledge base article acknowledging a problem with encryption acceleration in the newest versions of Windows that could result in data corruption. The company recommends installing the June 2022 security updates for Windows 11 and Windows Server 2022 "to prevent further damage," though there are no suggested solutions for anyone who has already lost data because of the bug.

    The problems only affect relatively recent PCs and servers that support Vector Advanced Encryption Standard (VAES) instructions for accelerating cryptographic operations. Microsoft says affected systems use AES-XTS or AES-GCM instructions "on new hardware." Part of the AVX-512 instruction set , VAES instructions are supported by Intel's Ice Lake, Tiger Lake, Rocket Lake, and Alder Lake architectures—these power some 10th-generation Core CPUs for laptops, as well as all 11th- and 12th-gen Core CPUs. AMD's upcoming Zen 4 architecture also supports VAES, though by the time these chips are released in the fall, the patches will have had plenty of time to proliferate.

    Microsoft says that the problem was caused when it added “new code paths” to support the updated encryption instructions in SymCrypt , Windows’ cryptographic function library. These code paths were added in the initial release of Windows 11 and Windows Server 2022, so the problem shouldn't affect older versions like Windows 10 or Windows Server 2019.

    Read 1 remaining paragraphs | Comments

    • chevron_right

      Feds issue emergency order for agencies to patch critical Windows flaw

      Dan Goodin · news.movim.eu / ArsTechnica · Monday, 21 September, 2020 - 22:13

    Close-up photograph of computer networking components.

    Enlarge (credit: Sebastian Kahnert/picture alliance via Getty Images )

    The US Department of Homeland Security is giving federal agencies until midnight on Tuesday to patch a critical Windows vulnerability that can make it easy for attackers to become all-powerful administrators with free rein to create accounts, infect an entire network with malware, and carry out similarly disastrous actions.

    Zerologon, as researchers have dubbed the vulnerability, allows malicious hackers to instantly gain unauthorized control of the Active Directory. An Active Directory stores data relating to users and computers that are authorized to use email, file sharing, and other sensitive services inside large organizations. Zerologon is tracked as CVE-2020-1472. Microsoft published a patch last Tuesday.

    An unacceptable risk

    The flaw, which is present in all supported Windows server versions, carries a critical severity rating from Microsoft as well as a maximum of 10 under the Common Vulnerability Scoring System. Further raising that stakes was the release by multiple researchers of proof-of-concept exploit code that could provide a roadmap for malicious hackers to create working attacks.

    Read 9 remaining paragraphs | Comments

    index?i=O-HOjM3d7B0:zX2ERA5yyO8:V_sGLiPBpWUindex?i=O-HOjM3d7B0:zX2ERA5yyO8:F7zBnMyn0Loindex?d=qj6IDK7rITsindex?d=yIl2AUoC8zA