This week Microsoft lastly launched a patch for a zero-day safety flaw being exploited by hackers, that the corporate had claimed since 2019 was not truly a vulnerability.
The volte-face from Microsoft pertains to “DogWalk”, a distant code execution vulnerability within the Microsoft Home windows Help Diagnostic Device (MSDT), affecting all Home windows variations going again so far as Home windows 7 and Server 2008.
Profitable exploitation of DogWalk can see malicious attackers acquire distant code execution on compromised laptop methods.
As a result of excessive severity of the DogWalk vulnerability (technically recognized by Microsoft as CVE-2022-34713), all customers of Home windows and Home windows Server are being urged to make sure methods are correctly up to date as quickly as potential.
Microsoft additionally famous that the vulnerability had been seen being actively exploited.
The DogWalk vulnerability, found by safety researcher Imre Rad on the finish of 2019, was initially downplayed by Microsoft who stated that it could not be fixing the bug because it didn’t view it as having happy its standards for being a vulnerability.
When issues about DogWalk resurfaced in June, an unofficial third-party patch was launched within the absence of any signal that Microsoft may change its stance.
With the discharge of an official patch in Microsoft’s newest month-to-month Patch Tuesday replace there isn’t a want any longer for customers to depend on a third-party repair.
Microsoft safety researcher Johnathan Norman provided an apology for the corporate’s gradual dealing with of the difficulty:
We lastly mounted the #DogWalk vulnerability. Sadly this remained a difficulty for much too lengthy. due to everybody who yelled at us to repair it.
The DogWalk vulnerability is only one of greater than 120 bugs in Microsoft’s code addressed by the August 2022 Patch Tuesday replace.