How to Fix the Top 10 Windows 10 Vulnerabilities [Infographic]

Abi Tyas Tunggal
Abi Tyas Tunggal
updated May 11, 2022

Genuine Windows 7 or Windows 8/8.1 owners are in for a pre-holiday treat from Microsoft: a free upgrade to Windows 10, no strings attached. Security-conscious users will appreciate some new features that enable better security—namely Windows Device Guard, Hello, and Passport. Despite these nifty additions for bolstering one’s desktop security posture, Windows 10 certainly hasn’t been without its own critical security flaws.

All software is prone to quality gaps and vulnerabilities—staying on top of these items is key to preventing systems from being exploited. The following are the top 10 Windows 10 vulnerabilities to-date and how to address them.

Top 10 Windows 10 Vulnerabilities

10. Windows 10 Mount Manager Vulnerability (CVE-2015-1769, MS15-085)

This vulnerability involves potential escalation of privilege by inserting a USB device into the target system. Through this method, an attacker could write a malicious binary to disk and execute the code. An update is available from Microsoft to patch this vulnerability.

9. Microsoft Edge Vulnerabilities (MS15-091)

The Edge browser's predecessor Internet Explorer was not the highest rated in terms of security, to say the least—and Edge seems to also be getting off to a rough start, security-wise. Various remote-code execution vulnerabilities and security feature bypass exploits can allow attackers to gain control over systems. More information and patching instructions are available on this item's security bulletin page.

8. Microsoft Graphics Component Vulnerabilities (MS15-080)

This grouping of vulnerabilities is related to various font and graphics memory-management flaws that could ultimately result in remote code execution if visiting an untrusted website with embedded fonts. Detailed patching information can be had on the item's security bulletin.

7. Internet Explorer Vulnerabilities (MS15-079)

Microsoft's famously maligned web browser has a slew of new vulnerabilities with Windows 10, the most serious of them allowing attackers to gain the system rights of the user. More information and patching details are available on the item's security bulletin page.

6. Microsoft Windows Journal Vulnerability (MS15-098)

This vulnerability could allow remote code execution to occur if users open a specially-crafted Journal file. More information and a patch is available on this item's security bulletin page.

5. Re-Direct to SMB Vulnerability (CVE-2015-5143) 

This security flaw impacts all versions of Windows—including Windows 10—and primarily involves a core Windows API library and how Windows connects to SMB. This could result in Windows users being redirected to malicious SMB-based servers and having their encrypted login credentials stolen. The most effective way mitigate this cyber threat is to block TCP ports 139 and 445 to disable SMB.

4. .NET Framework Escalation of Privilege Vulnerability (MS15-092)

Custom-crafted .NET applications can cause escalation of privilege exploits to occur. However, users must be first convinced/tricked into running said applications. More information and patch instructions are available on this item's security bulleting page.

3. Microsoft Font Driver Vulnerability (MS15-078)

Windows Adobe Type Manager improperly handles specially-crafted OpenType fonts, which can result in a remote code execution vulnerability. This may lead to attackers gaining complete control of the system to install programs, view/change/delete data, and create new accounts. Though Microsoft has auto-patched this flaw in the wild, the patch can also be manually downloaded and installed.

2. Windows 10 WiFi Sense Contact Sharing

By default, Windows 10 will share your wifi credentials to Outlook, Skype, and Facebook contacts—presumably to make wifi and hotspot sharing easier. This makes it possible for any of these said contacts to hop onto your wifi network—if in proximity—without authorization. While not necessarily a software vulnerability, this feature can lead to compromises, and should be remediated through the following steps:

  • Change the wifi network name/SSID to include the terms “_nomap_optout," prior to upgrading to Windows 10
  • Post-upgrade, change your Windows privacy settings  to disable Wi-Fi Sense sharing.

1. Win32k Elevation of Privilege Vulnerability (CVE-2015-0057)

This vulnerability involving a flaw in a GUI component of Windows 10—namely the scrollbar element—allows a threat actor to gain complete control of a Windows machine through privilege escalation. Microsoft has made a patch available for fixing this flaw.


To fix the above vulnerabilities, you'll need to identify all the required updates as noted by Windows Update. Alternatively, UpGuard provides a way for you to do this easily and automatically—across your whole environment—with a few mouse clicks. Our powerful policy engine can validate secure configurations for all environments, infrastructures, and application stacks. In this case, a simple Windows 10 security policy can be run to check for any of the above vulnerabilities—as well as new vulnerabilities not yet added to policy. Our OVAL-backed vulnerability detection and monitoring suite ensures that all Windows 10 nodes in your environment are free for vulnerabilities and security flaws.



Top 10 Windows 10 Vulnerabilities
Free eBook

Executive's Guide to Managing Cyber Risk

Learn how you, as an executive, can manage cyber risk across your organization.
UpGuard logo in white
Executive's Guide to Managing Cyber Risk
UpGuard free resources available for download
Learn more

Download our free ebooks and whitepapers

Insights on cybersecurity and vendor risk management.
UpGuard logo in white
eBooks, Reports & Whitepapers
UpGuard free resources available for download
UpGuard customer support teamUpGuard customer support teamUpGuard customer support team

See UpGuard In Action

Book a free, personalized onboarding call with one of our cybersecurity experts.
Deliver icon

Sign up to our newsletter

Get the latest curated cybersecurity news, breaches, events and updates in your inbox every week.
Free instant security score

How secure is your organization?

Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
  • Check icon
    Instant insights you can act on immediately
  • Check icon
    Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Website Security scan resultsWebsite Security scan rating