2/14/2023 0 Comments Update kb2538242![]() ![]() ![]() Refer to the table for the respective update instructions to close this vulnerability for your corresponding ZEISS device. ZEISS has assessed the impact of the vulnerability and recommends installing the updates listed for each device as indicated below. However, ZEISS recommends updating devices with the Microsoft patch and/or registry settings, as applicable, to ensure continued cybersecurity. The vulnerability does not affect safety and performance on any of the ZEISS devices. It can self-propagate specially crafted packets through a network using the HTTP protocol stack (http.sys) to process packets. A remote code-execution issue in the HTTP protocol stack stands out for researchers, given that it is wormable. The Microsoft Windows HTTP Protocol Stack Remote Code Execution vulnerability can potentially affect the Microsoft Windows 10 operating system (OS) by requiring no authentication before processing incoming HTTP requests in various system services and subsystems. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |