…“The vulnerable driver ships with every version of Windows, up to and including Server 2025,” Adam Barnett, lead software engineer at Rapid7, said. “Maybe your fax modem uses a different chipset, and so you don’t need the Agere driver? Perhaps you’ve simply discovered email? Tough luck. Your PC is still vulnerable, and a local attacker with a minimally privileged account can elevate to administrator.”…

  • Snot Flickerman@lemmy.blahaj.zone
    link
    fedilink
    English
    arrow-up
    28
    arrow-down
    1
    ·
    edit-2
    6 hours ago

    The exploits are addressed in the patch released yesterday, on the final day of support.

    Generally such exploits aren’t released to the public until they have been patched, to prevent wider abuse of the exploits in the meantime.

    https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-24990

    As you can see here near the bottom of the page it lists security updates for this epxloit having been released on October 14rh, 2025, the final day of Win10 support. These updates will still be available to Windows 10 systems even after October 14th, they will just be unable to get new patches after that date.

    • Paul Sutton (zleap)@techhub.social
      link
      fedilink
      arrow-up
      2
      arrow-down
      16
      ·
      6 hours ago

      @SnotFlickerman

      So will MS leave people in the lurch or issue an emergency patch? The former will drive people straight to replacements and the community need to be like a predator ready to move in to injured prey.

      If we don’t it will be a massive opportunity lost.

      • Snot Flickerman@lemmy.blahaj.zone
        link
        fedilink
        English
        arrow-up
        21
        arrow-down
        1
        ·
        edit-2
        6 hours ago

        The patch has already been released, that’s literally my point. It was part of their final patches released for Windows 10 yesterday.

        This is from the CVE page for the exploits discussed in the srticle.