The National Security Agency (NSA) in the United States has revealed a major flaw in Microsoft’s Windows 10 operating system that could have been used by hackers to create malicious software masquerading as legitimate code.
The tech giant has issued a patch, although it says it can find no evidence of the bug being exploited by hackers. It was not clear how long the NSA had known about the defect before alerting Microsoft.
Brian Krebs, the security expert who first reported the revelation, said the software giant had sent the patch to branches of the US military and other high-level users ahead of its wider release. It was, he wrote, “extraordinarily scary”.
The problem exists in a core component of Windows known as crypt32.dll, a program that allows software developers to access various functions, such as digital certificates which are used to sign software. It could, in theory, have allowed a hacker to pass off a piece of malicious software as being entirely legitimate.
The NSA’s director of cyber-security Anne Neuberger told reporters that the bug “makes trust vulnerable”. She added that the agency had decided to make its involvement in the discovery public at Microsoft’s request.
The flaw is also an issue in Windows Server 2016 and 2019, but does not appear to affect older versions of the operating system.
Prof Alan Woodward, a security expert based at Surrey University, said of the flaw:
It’s big because it affects the core cryptographic software used by Microsoft operating systems. Although there is no evidence that it has been exploited by hackers, it is a major threat as it lays users open to a range of attacks, so this is a case of don’t panic but apply the patch straightaway. …The concern is that as soon as the vulnerability is known about in detail, exploits will be produced and the laggards who don’t patch will be prime targets.
Source: BBC News