![]() |
Photo by Niclas Illg on Unsplash |
Microsoft acknowledged this critical bug and released information about it on its patch Tuesday release notes, the bug exists in the Windows SMB(server message block) which communicates with printers and file servers, etc. Tech Crunch notes that, if anyone can successfully exploit this bug, they can run malicious code on any affected PC.
Two days after the information of the Bug came out, Microsoft has patched the bug, the patch will resolve the problem in Windows 10 and Windows Server 2019, versions 1903 and 1909. This bug only affected the Windows 10 devices, earlier versions of the Windows will not be affected by this bug.
The patch will be updated along with the Patch Tuesday monthly updates, you don't have to download the patch separately, If you have disabled the updates of Windows, resume the updates for now and download the updates on your Windows 10 computer.
Comments
Post a Comment
Comment your thoughts and feedback