Windows 10 security bug leaves your PC vulnerable to attack: here’s how to patch it

Cryptographic flaw could let an attacker control your PC

When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.

Microsofthas released an urgent patch for Windows after the US National Security Agency (NSA) discovered a critical bug in theoperating system.

As part of its regular Patch Tuesday, the company issued a fix for the CVE-2020-0601 vulnerability and the NSA says that anyone runningWindows 10, Windows Server 2016 or Windows Server 2019 is “strongly encouraged” to install the patch.

This is the first time the NSA has publicly taken credit for the discovery of a software vulnerability, and the agency notified Microsoft to enable it to work on a fix. It is not thought that the vulnerability has been exploited as yet, but now that details are out in the wild it is imperative that all available updates are installed to keep Windows secure.

The problem exists in the Windows CryptoAPI (Crypt32.dll), and could enable an attacker to use fake security certificates to install malware under the guise of being valid software. Experts warn the vulnerability could also be exploited to attack networks.

In a tweet, the NSA advised Windows users about the bug and encouraged them to install the patch:

This #PatchTuesday you are strongly encouraged to implement the recently released CVE-2020-0601 patch immediately. https://t.co/czVrSdMwCR pic.twitter.com/log6OU93cVJanuary 14, 2020

Get patched

Get patched

Clearly the neither the NSA nor Microsoft want to give too many details about the vulnerability. It takes times for users to install patches and updates – particularly at a business level – so there is an understandable fear that attackers might try to take advantage of unpatched systems. Acknowledging that “sophisticated cyber actors will understand the underlying flaw very quickly”, the NSA deems the vulnerability to be severe.

In anadvisory noticeposted online, the agency said that it “recommends installing all January 2020 Patch Tuesday patches as soon as possible to effectively mitigate the vulnerability on all Windows 10 and Windows Server 2016/2019 systems”. For businesses and organisations with large numbers of computers to think about, the advice is to focus on patching the most vulnerable front-facing systems.

Are you a pro? Subscribe to our newsletter

Are you a pro? Subscribe to our newsletter

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

There’s no time to waste, so make sure you check for updates right now so you have all of the latest patches installed. You can do thisthrough Microsoft’s website, or by clicking the Start button and navigating to Settings > Update & Security > Windows Update.

Sofia is a tech journalist who’s been writing about software, hardware and the web for nearly 25 years – but still looks as youthful as ever! After years writing for magazines, her life moved online and remains fueled by technology, music and nature.

Having written for websites and magazines since 2000, producing a wide range of reviews, guides, tutorials, brochures, newsletters and more, she continues to write for diverse audiences, from computing newbies to advanced users and business clients. Always willing to try something new, she loves sharing new discoveries with others.

Sofia lives and breathes Windows, Android, iOS, macOS and just about anything with a power button, but her particular areas of interest include security, tweaking and privacy. Her other loves include walking, music, her two Malamutes and, of course, her wife and daughter.

You can find her onTwitterandMastodon.

Cisco issues patch to fix serious flaw allowing possible industrial systems takeover

Washington state court systems taken offline following cyberattack

Another reason to avoid edge-lit 4K TVs: they may fail faster than others, according to this report