New Vulnerability in Windows 10 allows attackers to crash your PC
A new Vulnerability in Windows 10 has been detected by researchers from the Carnegie Mellon University, it allows allows attackers to be able to crash computers. It seems that Microsoft has no fix for this issue just yet.
The vunerability is effecting the latest versions of Windows 8.1 and Windows 10. The issues is related towards the Windows SMB network protocol that connects Windows computers with network drives, printers and other devices. SMB will not not properly handle certain types of data. By creating a malicious SMB device and connect a computer to that will result into your PC crashing.
It is a little unclear how the vulnerability can be exploited as you need to perform this within a local LAN and this be in the same building as the PCs are. However of you have setup an open DMZ zone on your router or have ports TCP ports 139 and 445 along with UDP ports 137 and 138 you could be vunerable. Other then the crash no data otherwise is compromised.
Senior Member
Posts: 7175
Joined: 2005-12-02
Doesn't work here either since Windows 7 unless I specifically did something that could've made it crash (unstable OC, ...).
Senior Member
Posts: 13443
Joined: 2013-01-17
Could you elaborate please?
Senior Member
Posts: 6070
Joined: 2011-01-02
I gonna become PrMinisterGR and furiously defend Windows 10 in this thread.
This is a very small window to perform hack. You only have to worry if you using public WiFi / LAN and have vulnerable ports open. Also hacker have to have same windows built as you. And its only crash, not like your data gonna be stolen.
I'd rather worry about securing sensitive data transfer over public wifi than this exploit.
Senior Member
Posts: 11808
Joined: 2012-07-20
I gonna become PrMinisterGR and furiously defend Windows 10 in this thread.
This is a very small window to perform hack. You only have to worry if you using public WiFi / LAN and have vulnerable ports open. Also hacker have to have same windows built as you. And its only crash, not like your data gonna be stolen.
I'd rather worry about securing sensitive data transfer over public wifi than this exploit.
It is not about being on LAN with attacker. It is about having public IP (accessibility). NAT apparently cuts you away quite well.
Anyway, this week funny thing visited my email. UPC informed me that it is this time in a year and they focus on security. They decided that RDP I am using should be blocked and kindly offered to block it for me on their firewall.
If I ignored that mail, they would stick chewing gum into my ports...
I had hard time understanding their logic. As client paying for 3 public IPs, I apparently want my systems to be exposed.
Senior Member
Posts: 6952
Joined: 2008-10-27
Anyhow, if I get the gist correctly...how is this a vulnerability when for all intents and purposes, the attacker is the target?