…“The vulnerable driver ships with every version of Windows, up to and including Server 2025,” Adam Barnett, lead software engineer at Rapid7, said. “Maybe your fax modem uses a different chipset, and so you don’t need the Agere driver? Perhaps you’ve simply discovered email? Tough luck. Your PC is still vulnerable, and a local attacker with a minimally privileged account can elevate to administrator.”…

    • Snot Flickerman@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      37
      arrow-down
      1
      ·
      edit-2
      1 day ago

      The exploits are addressed in the patch released yesterday, on the final day of support.

      Generally such exploits aren’t released to the public until they have been patched, to prevent wider abuse of the exploits in the meantime.

      https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-24990

      As you can see here near the bottom of the page it lists security updates for this epxloit having been released on October 14rh, 2025, the final day of Win10 support. These updates will still be available to Windows 10 systems even after October 14th, they will just be unable to get new patches after that date.

      • Paul Sutton (zleap)@techhub.social
        link
        fedilink
        arrow-up
        2
        arrow-down
        19
        ·
        1 day ago

        @SnotFlickerman

        So will MS leave people in the lurch or issue an emergency patch? The former will drive people straight to replacements and the community need to be like a predator ready to move in to injured prey.

        If we don’t it will be a massive opportunity lost.

    • Alphane Moon@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      20 hours ago

      They will continue to releases major security updates for Windows 10 as long as it has double digit installed base share.

      • mic_check_one_two@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        2 hours ago

        Yeah, they did the same for Win7 for a long time. Win7 was so widely used (and people were so hesitant to upgrade after the awful 8/8.1 mess) that like 25-30% of all the computers in the world were still using it several years after support officially ended. It forced MS to continue issuing critical vulnerability patches for Win7, long after support officially ended. Because they didn’t want to be responsible for creating a massive “literally a quarter of all PCs in the world” botnet when they stopped patching things.