Security News > 2018 > August > 0patch releases micropatch for Windows Task Scheduler zero-day

Earlier this week a security researcher that goes by “SandboxEscaper” published details and a PoC exploit for a zero-day local privilege escalation vulnerability affecting Windows. Microsoft has, so far, been cagey about when they will push a fix for it. In the meantime, those who don’t want to wait have one other option: implement a temporary micropatch (a tiny security patch that’s implemented in memory, while the software is running). Get a micropatch Acros Security, … More → The post 0patch releases micropatch for Windows Task Scheduler zero-day appeared first on Help Net Security.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/Z9sQ5gX2n3s/
Related news
- Microsoft: Windows CLFS zero-day exploited by ransomware gang (source)
- Microsoft fixes actively exploited Windows CLFS zero-day (CVE-2025-29824) (source)
- PipeMagic Trojan Exploits Windows Zero-Day Vulnerability to Deploy Ransomware (source)
- Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day to Breach U.S. Organization (source)
- Play ransomware exploited Windows logging flaw in zero-day attacks (source)