security vulnerability

AppWizard
July 10, 2025
Activision has removed Call of Duty: WWII from the Microsoft Store and PC Game Pass due to reports of player hacks linked to a critical security vulnerability that allowed hackers to gain remote access to players' computers. This issue arose shortly after the game's introduction to Microsoft’s Game Pass in late June 2025, with players experiencing computer freezes, unexpected command prompts, shutdowns, and direct messages from hackers. The vulnerability, known as Remote Code Execution (RCE), was present in the outdated version on the Microsoft Store, while the Steam version had been patched. Activision has not provided details on the removal or a timeline for the game's return, and players are advised against downloading it from any platform until security concerns are addressed.
Winsage
July 10, 2025
A security vulnerability, designated CVE-2025-48818, has been identified in Windows BitLocker encryption, allowing attackers to exploit a time-of-check time-of-use (TOCTOU) race condition to bypass encryption. The vulnerability has a CVSS score of 6.8 and affects multiple versions of Windows, specifically targeting BitLocker Device Encryption. It requires physical access to the target system, has low attack complexity, and does not require user interaction. The affected Windows platforms include Windows 10 (versions 1607, 21H2, 22H2), Windows 11 (versions 22H2, 23H2, 24H2), and Windows Server editions (2016, 2022, 2025). Microsoft has released security updates to address this vulnerability, with key patches for specific Windows versions. System administrators are advised to install these updates and enhance physical security measures to prevent unauthorized access.
Tech Optimizer
July 5, 2025
A security vulnerability identified as CVE-2025-1735 in the PHP pgsql extension has been disclosed, classified with moderate severity. It arises from inadequate error checking during input data escaping, specifically the failure to pass error parameters to the PQescapeStringConn() function and not verifying NULL values from PQescapeIdentifier(). This flaw affects PHP versions prior to 8.1.33, 8.2.29, 8.3.23, and 8.4.10, allowing potential SQL injection attacks and application crashes due to null pointer dereferences. The vulnerability is linked to a recent PostgreSQL vulnerability (CVE-2025-1094) related to invalid multibyte character handling. Developers are urged to upgrade to patched releases to mitigate risks.
AppWizard
June 22, 2025
A significant security vulnerability has been discovered in Android's notification system, allowing malicious actors to exploit invisible Unicode characters to open deceptive links without user awareness. Research indicates that this flaw enables attackers to redirect users from seemingly legitimate links, such as "amazon.com," to malicious sites like "zon.com" through the use of zero-width space characters. Major applications including WhatsApp, Telegram, Instagram, Discord, and Slack have been confirmed as vulnerable to this exploit. Attackers can also use this vulnerability to initiate deep links that perform actions like making calls or sending messages without user consent. Traditional antivirus solutions may not detect these threats, as they do not involve conventional malware, highlighting the need for endpoint protection tools that focus on behavioral anomalies. Users are advised to be cautious with notifications and links from unfamiliar sources.
Winsage
June 17, 2025
Microsoft has made an adjustment to Windows Hello Facial Recognition that affects its functionality in dimly lit environments due to a security vulnerability. This change, introduced in the April 2025 Patch Tuesday updates for Windows 11 and Windows 10, requires color cameras to detect a visible face for sign-in. The update addresses a Windows Hello Spoofing vulnerability that was being exploited. Previously, the feature could identify users in low-light conditions using near-infrared imaging technology. Users have reported a workaround by disabling the webcam in Device Manager, allowing IR sensors to authenticate in low light.
Winsage
June 16, 2025
Microsoft updated its Windows Hello face unlock feature in April, requiring adequate lighting for functionality to address a security vulnerability. The facial recognition system now relies on color cameras to detect visible faces, making it ineffective in low-light conditions. Users can disable the webcam via Windows 11 Device Manager as a workaround, but this disables the camera for all applications. The security flaw was identified by researchers at Nanyang Technological University and classified by Microsoft as "important," though it has not been publicly disclosed or exploited. Inquiries about reinstating dark-room functionality in future updates are pending.
Winsage
June 12, 2025
A critical security vulnerability, designated as CVE-2025-33067, has been identified in the Windows Task Scheduler, allowing attackers to escalate privileges to SYSTEM level access without prior administrative rights. This vulnerability is rated as "Important" with a CVSS score of 8.4 and is due to improper privilege management within the Windows Kernel’s task scheduling component. It affects multiple Windows versions, including Windows 10 (Versions 1607, 1809, 21H2, 22H2), Windows 11 (22H2, 23H2, 24H2), and Windows Server 2016-2025. Microsoft released security updates on June 10, 2025, to address this flaw across 27 different Windows configurations. The vulnerability requires local system access, no prior privileges, and no user interaction, making it particularly dangerous. Security researcher Alexander Pudwill discovered and disclosed the vulnerability.
Winsage
June 9, 2025
The 'inetpub' folder, which appears on system drives (C:) after the April 2025 security update for Windows 10 and 11, is essential for protecting users against the security vulnerability CVE-2025-21204. This vulnerability involves improper link resolution before file access and can allow an authorized attacker to escalate privileges. Although the folder may seem empty and Internet Information Services (IIS) might not be in use, its deletion can compromise the effectiveness of the security patch, exposing systems to vulnerabilities. Microsoft recommends using a PowerShell script to restore the folder if deleted, rather than recreating it through IIS, which may add unwanted system folders.
Winsage
June 9, 2025
A recent Microsoft security update has created a new folder named "inetpub" on Windows systems, which is essential for system security. If users delete this folder, it can lead to significant vulnerabilities. Microsoft has released a Powershell script, Set-InetpubFolderAcl.ps1, to restore the "inetpub" folder and set the correct permissions. Systems that installed the April security update (KB5055528) must take immediate action if the "inetpub" directory is missing. The script also updates access rights for the "DeviceHealthAttestation" directory, if it exists. Administrative rights are required to run the script. This issue was highlighted by IT security researcher Kevin Beaumont, who noted that deleting the "inetpub" folder could disrupt the installation of future security updates.
Search