ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

48 Vulnerabilities Resolved On Patch Tuesday

48 Vulnerabilities Resolved On Patch Tuesday

Microsoft’s monthly Patch Tuesday issued resolutions to 48 vulnerabilities in August, including 15 that affected Windows, 25 critical flaws, 21 important flaws, and 27 that allowed for remote execution. This is a lot to consider, but the main jist of this is that lots of threats were fixed, and that your organization shouldn’t risk not implementing them as soon as possible.

Only 15 of the vulnerabilities affected Windows itself, but the others addressed issues with other Microsoft products, including Internet Explorer, Microsoft Edge, SharePoint, SQL Server, Hyper-V, and Kernel. Yet, only two of these flaws affected every single version of Windows and Windows Server, and none of them were being exploited in the wild by hackers.

One of these vulnerabilities demands your immediate attention, though, and that is the one that has your Windows Search feature in its crosshairs. This vulnerability, coded by Microsoft as CVE-2017-8620, can use the Server Management Block (SMB) to remotely control a system, be it a Windows Server unit or a Windows workstation. Since the flaw isn’t located in SMB itself, it isn’t affected by other threats like the notorious WannaCry ransomware and NotPetya.

This Windows advisory claims that the vulnerability takes advantage of the way that Windows Search works with objects in memory. A hacker can send customized messages through the Windows Search function to change user permissions. They can then take full advantage of their permissions to install, remove, or change applications on any infected device. They can also view, change, or delete any data that’s stored on it, or create a new account just for them with full administrator privileges.

A vulnerability like this is exactly what a hacker wants. They can basically take full control over a victim’s computer with minimum trouble. If you implement patches and security updates as they are released, you shouldn’t have anything to worry about. Does your business have an organized approach to implementing security patches? If not, there are solutions available that you can use to keep security at a maximum.

Outsourced IT often includes remote patching and maintenance that can be used, even by small businesses. Even better, it does this without costing your business an arm and a leg. Enterprise-level solutions are often the only way for your business to thrive in a world filled with competition, but that’s because they provide a significant benefit to your organization that you can’t afford to ignore. We can improve your network security in the same way as an internal IT department, but without the costs associated with adding new salaries to your budget. ClearView IT can help your organization implement new security solutions like remote monitoring and maintenance. To learn more, reach out to us at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Phishing Cybersecurity Business Management IT Services Backup Ransomware Data Backup communications Smartphone Small Business Upgrade Smartphones Microsoft Office Network Mobile Devices Managed IT Services Communication Data Recovery Quick Tips Productivity Social Media Users VoIP Mobile Device Automation Tech Term Facebook Windows 10 Business Continuity Passwords Holiday Covid-19 Disaster Recovery IT Support Browser Windows 10 Managed Service Apps Miscellaneous Cloud Computing Outsourced IT Remote Work Managed Service Provider Data Management Internet of Things Saving Money Operating System Government Artificial Intelligence Gadgets Managed IT services Workplace Strategy Networking Windows App WiFi Virtualization Remote Information Spam Business Technology Bandwidth Encryption Blockchain Server Mobile Device Management Office Two-factor Authentication Apple Office 365 Employee/Employer Relationship Information Technology History Budget Gmail Conferencing BDR Cybercrime Wi-Fi Health Access Control Analytics Data Security Big Data Patch Management Help Desk Hacking Cost Management Remote Monitoring Vendor Hacker Document Management IT Management Save Money Voice over Internet Protocol Training Employer-Employee Relationship Compliance Remote Computing Password Vendor Management Hard Drive Project Management Legal Applications Money Data storage Vulnerabilities Customer Service Search... Unified Threat Management Firewall Best Practice Mobile Office Augmented Reality Retail Managed Services Word Alert IBM BYOD Website Hiring/Firing Data loss Computing Outlook Paperless Office The Internet of Things YouTube Antivirus Chrome Maintenance Twitter Laptop Data Breach Law Enforcement End of Support Printer Mobile Computing Websites Mobility Marketing Meetings Running Cable Sports Social Monitoring Google Maps SaaS DDoS Remote Workers Healthcare Scam Travel Virtual Reality Storage Social Engineering Cryptocurrency Windows 7 Black Market iPhone Free Resource Education Cortana VPN Cleaning Content Filtering How To Update Robot User Router Windows 11 Chromebook Drones Employees Virtual Assistant Avoiding Downtime Physical Security Automobile Holidays Wireless Technology eWaste PowerPoint How To Microchip Administration Processor Start Menu Cooperation Flexibility Downtime Downloads Video Conferencing Presentation Computer Care Safety Specifications Vulnerability IT Consultant Virtual Machines Hack Identity Theft Computer Repair Virtual Desktop Notifications Software as a Service Unified Communications Data Protection Customer Relationship Management Professional Services Experience Multi-factor Authentication Co-Managed IT Google Docs Entertainment Bluetooth Distributed Denial of Service Managed Services Provider Office Tips Saving Time Memory Private Cloud Disaster Virtual Private Network Computers Bitcoin Tech Terms Lithium-ion battery Telephone Current Events Managed IT Politics Settings Digital HIPAA Solutions Machine Learning Excel Processors Images 101 Integration Taxes Solid State Drive Display AI Fileless Malware Trend Micro Tip of the week Books Language Digital Security Cameras Audit Society Electronic Health Records Gamification Spyware Transportation Company Culture Supply Chain Wasting Time Regulations File Sharing Telephone System Directions Redundancy Visible Light Communication eCommerce Backup and Disaster Recovery Modem Reading Monitors Public Speaking Videos Windows 8 Surveillance Content Cache Desktop Workplace Managing Costs Accountants Workers Streaming Media Electronic Medical Records Unified Threat Management Inbound Marketing Advertising Database SSID Relocation Displays Keyboard Work/Life Balance Hard Drives Media Printing Tech Support Development Employer/Employee Relationships CCTV Scams Virtual Machine Equifax intranet Health IT Touchscreen Shortcut Reviews Emergency Electronic Payment Optimization Tactics Hard Drive Disposal Computer Malfunction Wireless In Internet of Things Heating/Cooling 2FA Environment Username Vendor Mangement Teamwork Cables Hypervisor Startup Samsung Windows XP Freedom of Information Hacks Network Congestion Social Networking Data Storage Writing Shopping Navigation Addiction Uninterrupted Power Supply Phone System Medical IT email scam Webcam Reliable Computing Paperless Business Mangement SQL Server Mobile Security Point of Sale Licensing Legislation Tablets News PCI DSS User Tip Gig Economy Evernote Humor Network Management Shortcuts Scalability Administrator Text Messaging Business Communications Google Calendar Proactive IT Internet Service Provider Azure Supercomputer Managed IT Service Emails Computer Accessories Fake News Bring Your Own Device Regulations Compliance Proxy Server Virus Memes Service Level Agreement Computing Infrastructure Motion Sickness Be Proactive Staffing IP Address Human Resources Comparison Music Net Neutrality Management Google Drive Device security Wireless Headphones Microsoft Excel Financial Data Risk Management Tech Knowledge IT Going Green Corporate Profile Business Cards Workplace Strategies Botnet Google Apps Television Error Telephony Employer Employee Relationship Cabling Rental Service Micrsooft Telework Bookmark Flash Competition Smartwatch Term Communitications Download Tablet Microsoft 365 Piracy G Suite Recovery Telephone Systems Mouse Business Growth Procurement VoIP Troubleshooting HTML Tracking Nanotechnology LiFi Entrepreneur FinTech Browsers Application CES Google Play IT Assessment Upload Software License Web Server Smart Technology Documents Digital Payment Banking SharePoint Google Wallet Business Intelligence Supply Chain Management Social Network Value Data Analysis Cyber security Screen Reader Worker Messenger Deep Learning Organization Security Cameras Smart Devices Trends Access Mobile Technology Securty Devices Public Cloud Business Metrics Domains Hosted Solution Remote Working Customer Resource management Time Management Business Owner

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?