Newsletter Archives
-
MS-DEFCON 3: Blocking a potential wormable event
ISSUE 21.33.1 • 2024-08-16 By Susan Bradley
It’s been a long time since we’ve had a Microsoft worm event.
Last week’s patches contained a fix for the Windows TCP/IP Remote Code Execution Vulnerability identified as CVE-2024-38063. This one affects all supported Windows versions and extends back to Windows 7 and Windows 8, including older servers.
This CVE has a very high danger rating. Because of that, I am lowering the MS-DEFCON level earlier than I normally would, setting it to 3. That sounds backward, but this advisory is conditional, based upon the type of user you are and how you decide to deal with the update.
Although the danger is real, I believe the risk is somewhat less. In this alert, I’ll explain why.
Anyone can read the full MS-DEFCON Alert (21.33.1, 2024-08-16).
-
Server updates fail to download
PATCH WATCH
By Susan Bradley
The March updates for Windows opened the month on a bumpy road.
The most significant bump relates to the update for Windows Server, demonstrating that it’s not just client PCs that have problems. Fortunately, the problem seems to have been fixed quickly.
KB5035849 is the culprit.
Read the full story in our Plus Newsletter (21.12.0, 2024-03-18).
-
Sign up for the Windows Server beta program now
If you’re in to on-premises Windows Server you can now sign on to beta test the twice-a-year product updates.
Server’s going to a twice-a-year update schedule, just like Win10 and Office, and the process has the same familiar ring to it, “Semi-annual Channel releases.” Shortly Server will have its own Insider Program as well.
I can’t think of any better way to kill on-prem Server, than to force it into a twice-a-year upgrade cadence.
Sign up here.