Microsoft released major updates last week with dozens of different patches for its Windows 11 and Windows 10 operating systems. Among them was a patch intended to fix a vulnerability found in the Windows kernel in connection with access to confidential information. As it turned out, installing a patch that eliminates this vulnerability can lead to new problems.
The specified patch is intended to fix the vulnerability identified as CVE-2023-32019. The description states: “An authenticated user (attacker) can gain access to information on a PC through a vulnerability in the Windows kernel.” In this case, the attacker does not need administrator rights or other elevated user rights. After gaining access, an attacker can view the contents of dynamic memory through a privileged process started by an authorized user of the system.
To fix this vulnerability, Microsoft has released patches KB5027215 (for Windows 10 versions 21H2 and 22H2 and Windows Server 20H2) and KB5027231 for Windows 11. As it turned out, installing these patches can cause bugs in operating systems. For example, after installing the KB5027231 update, some Windows 11 users complained that their Malwarebytes antivirus started to block the Chrome browser from running on their PC. Other users, on the other hand, notice a very long installation of the KB5027215 update on Windows 10 – for some it took up to half an hour.
Microsoft has now recognized the problem with these updates and disabled them by default. If desired, the user can activate them through the registry of the operating system. The company provided instructionsHow to do it, see the official website. A future release of security updates will enable these patches by default.