We'd like to keep you informed on the latest regarding security to safeguard your business. We consider the safety of your infrastructure as important as our own. Our security team identified a critical vulnerability that may affect you if you are currently using any version of Windows Server.

Below, we've detailed the respective steps to take in order to resolve the vulnerability.

 

Windows TCP/IP Vulnerability
A 'zero click' vulnerability was found in Windows operating systems, which allows for remote code execution. This bug is present in Windows systems where IPv6 is enabled, which is enabled by default since Windows Server 2008. Please take the time to install the latest security updates. Use the Microsoft website to find the correct patch and instructions via this link.

If you are not able to patch CVE-2024-38063 immediately, please disable IPv6 temporarily.

 

What should I do?
? Patch your Windows systems immediately, via this link.
? If you are not able to patch your systems for any reason, use the workaround by disabling IPv6 on your Windows Server.
? Make use of active offsite or offline backup methods for critical data.
? For further reading on this particular vulnerability we'd recommend to read this overview.
If you have any additional questions or comments regarding this security update, feel free to contact us!


Kind regards,

HostSlick e. K.

 



Wednesday, August 21, 2024





<< Zpět