Every Modern Version of Windows Suffers from a “Critical Vulnerability” – Download the Patch

WindowsHeader

It has been revealed that every modern version of Microsoft’s Windows operating system, including Windows Server 2003/2008/2012, Vista, 7, 8, 8.1, and Windows RT, suffers from a “critical vulnerability” that allows attackers to modify packets and remotely trigger code on your machine without having an authorized account.

Here is a full list of every OS that is vulnerable to potential attacks:

  • Windows Server 2003 Service Pack 2 
  • Windows Server 2003 x64 Edition Service Pack 2 
  • Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista
  • Windows Vista Service Pack 2 
  • Windows Vista x64 Edition Service Pack 2 
  • Windows Server 2008 for 32-bit Systems Service Pack 2 
  • Windows Server 2008 for x64-based Systems Service Pack 2 
  • Windows Server 2008 for Itanium-based Systems Service Pack 2 
  • Windows 7 for 32-bit Systems Service Pack 1 
  • Windows 7 for x64-based Systems Service Pack 1 
  • Windows Server 2008 R2 for x64-based Systems Service Pack 1 
  • Windows Server 2008 R2 for Itanium-based Systems Service Pack 1 
  • Windows 8 for 32-bit Systems 
  • Windows 8 for x64-based Systems 
  • Windows 8.1 for 32-bit Systems 
  • Windows 8.1 for x64-based Systems 
  • Windows Server 2012 
  • Windows Server 2012 R2 
  • Windows RT[1] 
  • Windows RT 8.1[1] 
  • Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
  • Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 
  • Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 
  • Windows Server 2012 (Server Core installation) 
  • Windows Server 2012 R2 (Server Core installation) 

Microsoft has responded to this vulnerability by releasing a patch, which according to the company is the only download that can solve the issue.

The patch can either be downloaded using Windows Update, or by heading over to Microsoft Support by clicking right here.