in ,

Microsoft “breaks” the VPN with the latest update for Windows


Microsoft “breaks” the VPN with the latest update for Windows

Mag 02, 2024
In evidence, News, RSS, Vulnerability


The latest security update for Windows 11 is causing some problems: version 23H2 released in April is blocking the proper functioning of VPNsand not only.

“Windows devices may encounter VPN connection problems after installing the April 2024 security update or non-security update preview” it is read on the Microsoft blog.

Platforms affected by the bug also include Windows 11 versions 22H2 and 21H2 and Windows 10 versions 22H2 and 21H2, as well as Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, Windows Server 2012, Windows Server 2008 R2 and Windows Server 2008.

The company did not specify what is causing this issue, nor how long it will take to fix it.

Pixabay

The update issues not only affected the VPN, but also BitLocker, some Intel Smart Sound Technology drivers, and Copilot. The first two bugs have already been handled, while the fix for the last one is still being worked on; in detail, The Edge update installs a new, unrequired package that shows Microsoft Copilot among the installed applications.

The Edge update downloads the “Microsoft chat provider for Copilot in Windows” package without the user's permission, causing Copilot to appear among the applications installed on the device. The package, explains Microsoft, serves to prepare some Windows devices for future compatibility with Copilot, but does not install or enable the actual execution of the feature. The company also emphasizes that the provider does not execute any code or process and does not collect any data on the device.

Microsoft ha temporarily mitigated the problem with a new Edge update which however is not yet available for all devices. A new definitive update is expected in the coming weeks.

The company is working on fixes for the two problems and for the first there are currently no workarounds to mitigate it; the only solution is uninstall the update and wait for new communications, aware however that in this way all the new security features will also be uninstalled.



More in this category

What do you think?

Leave a Reply

Your email address will not be published. Required fields are marked *

GIPHY App Key not set. Please check settings

CISA adds Cisco ASA and FTD and CrushFTP VFS flaws to its Known Exploited Vulnerabilities catalog

CISA adds GitLab flaw to its Known Exploited Vulnerabilities catalog

Just because I am in this mountain: I work as a volunteer in Mount Wutai