What is the latest on Microsoft’s latest security fix for Windows 10?
Microsoft announced on Thursday that it has patched the vulnerability that lets remote attackers install malware on computers that are running the Windows 10 operating system.
Microsoft also says it has released an update that addresses the same issue that could allow attackers to install malicious code on a computer that is running the operating system and then run other malicious code, which could be a remote code execution vulnerability.
The fix is available as a free download for all users of the Windows 7, Windows 8, Windows 10 and Windows Server 2016 operating systems and as a paid download for users who purchase a qualifying subscription to Windows Server.
Microsoft said that it plans to release the patch for all three versions of Windows 10 in the next couple of days.
“The Microsoft Update process for Windows 8.1 and Windows 10 will not work until March 12,” Microsoft said.
“After March 12, the update will be rolled out as a Free Upgrade and will only be available to qualified Windows Insiders who have an account on Microsoft.com.”
After March 18, customers will need to re-apply the update to continue to get the benefit of the upgrade,” Microsoft added.
The Windows Defender Anti-Virus software patch was released in March.
Microsoft has said it will update the security update automatically to prevent a similar incident from occurring.
In its security update for Windows 7 and Windows 8 and Windows Vista, Microsoft said the vulnerability could allow remote attackers to compromise a computer through the use of the same credentials that are used to access files on that computer, which allows attackers to perform a man-in-the-middle attack.
On Thursday, Microsoft also released an updated security update that fixes the same vulnerability.
It also released the Windows Defender Advanced Threat Protection (ATP) software patch that is also included in the Windows Server Update Catalog.
Microsoft has said that Microsoft is working on a fix for the same bug.