Windows 10 critical flaws revealed in April security update: What to do now
Three zero-day exploits were patched
Microsoft published its April security release notes on Tuesday, announcing patches for more than 100 vulnerabilities, many of which are listed a "critical." Of those, three were actively exploited zero-day attacks.
We'll focus on the vulnerabilities Microsoft considers critical, especially those three zero-days. Keep in mind, for a security flaw to be deemed "critical," it must let malware exploit and gain control over a system without help from the owner.
We don't know much about the three zero-day flaws; Microsoft typically keeps the details at a minimum for several weeks so it can finish rolling out a patch and give Windows 10 users enough time to install it.
The three actively exploited zero-days are listed as CVE-2020-1020, CVE-2020-0938 and CVE-2020-1027. The first vulnerability, CVE-2020-1020, is a flaw in the Windows Adobe Type Manager Library that lets attackers remotely take control of a system (via ZDNet). Fortunately, this particular vulnerability doesn't affect Windows 10. If you're still using Windows 7, it's time to upgrade.
CVE-2020-0938 is also in the Windows Adobe Type Manager Library. It's similar to the first and lets bad actors install programs or change data.
The third and final zero-day found in the wild is an issue with how the Windows kernel handles objects in memory. When exploited, an attacker can execute code with "elevated permissions."
Of the security vulnerabilities, those three are the scariest. However, a total of 19 critical flaws were patched, seven of which impact Windows 10 laptops and desktops. Three of those --- CVE-2020-0948, CVE-2020-0949 and CVE-2020-0950 --- exist as memory corruption flaws in the Windows Media Foundation.
Not every deal is worth a squeal. Get only the good stuff from us.
The deal scientists at Laptop Mag won't direct you to measly discounts. We ensure you'll only get the laptop and tech sales that are worth shouting about -- delivered directly to your inbox this holiday season.
"An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights," Microsoft notes.
How to protect your Windows PC
As per usual, Microsoft released a lump update on Patch Tuesday yesterday to fix all of these exploits at once. That makes our advice to you straightforward: update your Windows 10 device.
Yes, we know, Windows is a mess right now with each new update causing more harm than good. But security patches like the one Microsoft is pushing out are crucial to the safety of your PC and the sensitive information that lives inside.
If you're not a high-risk target -- a government employee, business exec, celebrity, etc -- then you're probably OK waiting for the update to hit your laptop. If you are, or just want extra reassurance, jump in front of the line by manually forcing the update. You can do this by typing "Update" into the search bar and "Check for update" on the next two pages. This will push out any updates available for your Windows 10 PC.
Phillip Tracy is the assistant managing editor at Laptop Mag where he reviews laptops, phones and other gadgets while covering the latest industry news. After graduating with a journalism degree from the University of Texas at Austin, Phillip became a tech reporter at the Daily Dot. There, he wrote reviews for a range of gadgets and covered everything from social media trends to cybersecurity. Prior to that, he wrote for RCR Wireless News covering 5G and IoT. When he's not tinkering with devices, you can find Phillip playing video games, reading, traveling or watching soccer.