{"id":88299,"date":"2016-04-25T17:07:34","date_gmt":"2016-04-25T15:07:34","guid":{"rendered":"http:\/\/onsoftware.en.softonic.com\/?p=88299"},"modified":"2025-07-01T23:59:04","modified_gmt":"2025-07-02T06:59:04","slug":"warning-this-security-flaw-in-windows-could-put-your-pc-at-risk","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/en\/warning-this-security-flaw-in-windows-could-put-your-pc-at-risk\/","title":{"rendered":"Warning! This security flaw in Windows could put your PC at risk!"},"content":{"rendered":"<p>A new serious <strong>security flaw<\/strong> has been detected on <strong>Windows<\/strong> that could put you at risk. It\u2019s so sneaky, that it\u2019s able to run any program without Administrator permission \u2013 this includes malicious apps that can have fatal consequences.<\/p>\n<p>This bug, discovered by researcher Casey Smith, makes it possible to run any app remotely \u2013 even if the infected user is using <strong>AppLocker <\/strong>(a program that prevents programs starting up without permission from the Administrator). This security flaw takes advantage of the Regsvr32 tool.<\/p>\n<p>But relax, we also didn\u2019t know what <strong>Regsvr32<\/strong> was before writing this article, so here\u2019s a bit of a summary for you to chew on. It\u2019s basically a tool within the <strong>Windows<\/strong> command line that handles log entries. By using it maliciously, and taking advantage of the flaw, a hacker is able to run any program on the PC, including malware or malicious software. Since the system doesn\u2019t require the Administrator password nor does it alter the system registry, it\u2019s almost impossible to trace where the attack is coming from.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" title=\"command-prompt\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2016\/04\/command-prompt-568x285.png\" alt=\"\" width=\"568\" height=\"285\" \/><\/p>\n<p>The security flaw affects the business editions of <strong>Windows 7 <\/strong>onwards, so as you can imagine, this has the potential to be more of a problem for <strong>businesses rather than individual users.<\/strong><\/p>\n<p>Knowing <strong>Microsoft<\/strong>, we imagine that they\u2019ll soon find a solution to this security breach, but it certainly never hurts to at least be aware of the current\u00a0<strong><\/strong>at this moment in time! Be careful!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new serious security flaw has been detected on Windows that could put you at risk. It\u2019s so sneaky, that it\u2019s able to run any program without Administrator permission \u2013 this includes malicious apps that can have fatal consequences. This bug, discovered by researcher Casey Smith, makes it possible to run any app remotely \u2013 &hellip; <a href=\"https:\/\/cms-articles.softonic.io\/en\/warning-this-security-flaw-in-windows-could-put-your-pc-at-risk\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Warning! This security flaw in Windows could put your PC at risk!&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2040,"featured_media":88301,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":0},"categories":[],"tags":[],"usertag":[],"vertical":[],"content-category":[],"class_list":["post-88299","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/88299","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/users\/2040"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/comments?post=88299"}],"version-history":[{"count":1,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/88299\/revisions"}],"predecessor-version":[{"id":329039,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/88299\/revisions\/329039"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media\/88301"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media?parent=88299"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/categories?post=88299"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/tags?post=88299"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/usertag?post=88299"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/vertical?post=88299"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/content-category?post=88299"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}