A dodgy patch has left a bunch of Windows systems open to attack
Windows patch accidentally disables Microsoft Defender for Endpoint
When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.
Microsofthas revealed a botched update has disabledendpoint securityprotections across a large number of Windows-based systems.
Although PCs runningWindows 10andWindows 11are unaffected, the offending patch has left devices running Windows Server 2019 and 2022 open to attack.
“After installing KB5007205 or later updates, Microsoft Defender for Endpoint might fail to start or run on devices with a Windows Server Core installation,” warned Microsoft, in aposton the Windows Server health dashboard.
The company says it is currently developing a patch to address the problem, but did not respond immediately to our request for clarification as to when customers can expect the issue to be fixed.
More Windows security problems
Unfortunately, this isn’t the only issue introduced during the latest round of Windows updates. Microsoft was also forced toroll out a fixfor a bug that was preventing Kasperskyantivirusapps from opening after updates were installed using the Microsoft Installer.
Unlike the Windows Server issue, this problem affected regular users runningWindows 10and 11, as well as businesses.
“After the installation of a Windows update Kaspersky Endpoint Security for Windows keeps functioning correctly and the security of the system remains intact. However, errors may occur at attempts to upgrade the application, install a private patch or change the scope of the application components,” wrote Kaspersky in asupport document.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Separately, security researchers at Trend Microdisclosed an exploitfor a zero-day vulnerability that could allow an attacker to seize admin privileges across all supported versions of Windows.
Microsoft attempted to remedy a connected problem as part of the most recent Patch Tuesday, but analysis of thepatchrevealed a bypass that led to this new, more dangerous privilege elevation vulnerability.
ViaBleeping Computer
Joel Khalili is the News and Features Editor at TechRadar Pro, covering cybersecurity, data privacy, cloud, AI, blockchain, internet infrastructure, 5G, data storage and computing. He’s responsible for curating our news content, as well as commissioning and producing features on the technologies that are transforming the way the world does business.
Phishing attacks surge in 2024 as cybercriminals adopt AI tools and multi-channel tactics
This new phishing strategy utilizes GitHub comments to distribute malware
Smeg Combi Steam Oven review: a multi-functional countertop oven that looks stunning and cooks well