Genuine Windows 7 or Windows 8/8.1 owners are in for a pre-holiday treat from Microsoft: a free upgrade to Windows 10, no strings attached. Security-conscious users will appreciate some new features that enable better security—namely Windows Device Guard, Hello, and Passport. Despite these nifty additions for bolstering one’s desktop security posture, Windows 10 certainly hasn’t been without its own critical security flaws.

All software is prone to quality gaps and vulnerabilities—staying on top of these items is key to preventing systems from being exploited. The following are the top 10 Windows 10 vulnerabilities to-date and how to address them.

Top 10 Windows 10 Vulnerabilities

10. Windows 10 Mount Manager Vulnerability (CVE-2015-1769, MS15-085)

This vulnerability involves potential escalation of privilege by inserting a USB device into the target system. Through this method, an attacker could write a malicious binary to disk and execute the code. An update is available from Microsoft to patch this vulnerability.

9. Microsoft Edge Vulnerabilities (MS15-091)

The Edge browser's predecessor Internet Explorer was not the highest rated in terms of security, to say the least—and Edge seems to also be getting off to a rough start, security-wise. Various remote-code execution vulnerabilities and security feature bypass exploits can allow attackers to gain control over systems. More information and patching instructions are available on this item's security bulletin page.

8. Microsoft Graphics Component Vulnerabilities (MS15-080)

This grouping of vulnerabilities is related to various font and graphics memory-management flaws that could ultimately result in remote code execution if visiting an untrusted website with embedded fonts. Detailed patching information can be had on the item's security bulletin.

7. Internet Explorer Vulnerabilities (MS15-079)

Microsoft's famously maligned web browser has a slew of new vulnerabilities with Windows 10, the most serious of them allowing attackers to gain the system rights of the user. More information and patching details are available on the item's security bulletin page.

6. Microsoft Windows Journal Vulnerability (MS15-098)

This vulnerability could allow remote code execution to occur if users open a specially-crafted Journal file. More information and a patch is available on this item's security bulletin page.

5. Re-Direct to SMB Vulnerability (CVE-2015-5143) 

This security flaw impacts all versions of Windows—including Windows 10—and primarily involves a core Windows API library and how Windows connects to SMB. This could result in Windows users being redirected to malicious SMB-based servers and having their encrypted login credentials stolen. The most effective way mitigate this cyber threat is to block TCP ports 139 and 445 to disable SMB.

4. .NET Framework Escalation of Privilege Vulnerability (MS15-092)

Custom-crafted .NET applications can cause escalation of privilege exploits to occur. However, users must be first convinced/tricked into running said applications. More information and patch instructions are available on this item's security bulleting page.

3. Microsoft Font Driver Vulnerability (MS15-078)

Windows Adobe Type Manager improperly handles specially-crafted OpenType fonts, which can result in a remote code execution vulnerability. This may lead to attackers gaining complete control of the system to install programs, view/change/delete data, and create new accounts. Though Microsoft has auto-patched this flaw in the wild, the patch can also be manually downloaded and installed.

2. Windows 10 WiFi Sense Contact Sharing

By default, Windows 10 will share your wifi credentials to Outlook, Skype, and Facebook contacts—presumably to make wifi and hotspot sharing easier. This makes it possible for any of these said contacts to hop onto your wifi network—if in proximity—without authorization. While not necessarily a software vulnerability, this feature can lead to compromises, and should be remediated through the following steps:

  • Change the wifi network name/SSID to include the terms “_nomap_optout," prior to upgrading to Windows 10
  • Post-upgrade, change your Windows privacy settings  to disable Wi-Fi Sense sharing.

1. Win32k Elevation of Privilege Vulnerability (CVE-2015-0057)

This vulnerability involving a flaw in a GUI component of Windows 10—namely the scrollbar element—allows a threat actor to gain complete control of a Windows machine through privilege escalation. Microsoft has made a patch available for fixing this flaw.

Remediation

To fix the above vulnerabilities, you'll need to identify all the required updates as noted by Windows Update. Alternatively, UpGuard provides a way for you to do this easily and automatically—across your whole environment—with a few mouse clicks. Our powerful policy engine can validate secure configurations for all environments, infrastructures, and application stacks. In this case, a simple Windows 10 security policy can be run to check for any of the above vulnerabilities—as well as new vulnerabilities not yet added to policy. Our OVAL-backed vulnerability detection and monitoring suite ensures that all Windows 10 nodes in your environment are free for vulnerabilities and security flaws.

Sources

https://www.pcgamer.com/critical-windows-security-vulnerability-discovered/

https://www.darkreading.com/cloud/microsoft-windows-10-three-security-features-to-know-about/d/d-id/1320650

Infographic

Top 10 Windows 10 Vulnerabilities

Ready to see
UpGuard in action?

Ready to save time and streamline your trust management process?