Microsoft knew about IE bug since last year
Microsoft has explained that the complexities of fixing a bug in the system meant that it took more than a year to fix an IBM reported flaw.

Microsoft knew about an ActiveX control flaw that has now left Internet Explorer users vulnerable to attack, since last spring.
Mike Reavey, director of the Microsoft Security Response Centre, said in its blog that it received a report from the IBM ISS X-Force last year.
In an investigation it was confirmed that the ActiveX control shipping with Windows had an exploitable vulnerability.
The company didn't issue an advisory until this week, when reports first surfaced that hackers were taking advantage of the vulnerability to target Internet Explorer users.
Engineering teams believed that the best approach was to completely remove the ActiveX control from Internet Explorer, but it took some time for Microsoft to properly evaluate what this could do.
Reavey said that when disabling or removing functionality, Microsoft had to engage in more research and testing than usual. This ensured that it could take the step and not cause more harm than good by inadvertently breaking' applications.
He said: "For something like this, we have to ensure not only our applications but also major third-party applications are not hurt by this.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"Otherwise, if out update breaks' a major application, customers won't deploy the update but the bad guys will have information about the vulnerability they can use to attack it," Reavey added.
The Microsoft statement came as it revealed that at next week's Patch Tuesday it would release a total of six security bulletins with three critical updates for Windows.
The ActiveX flaw will be fixed, as well as an earlier vulnerability that affected Microsoft DirectX.
-
Why Microsoft thinks diversity will keep security workers relevant in the age of agentic AI
News Improved AI skills and a greater focus on ensuring agents are secure at point of deployment will be key for staying ahead of attackers
-
Microsoft: get used to working with AI-powered "digital colleagues"
News Tech giant's report suggests we should get ready to work with AI, revealing future trends for the workplace
-
Vulnerability management complexity is leaving enterprises at serious risk
News Fragmented data and siloed processes mean remediation is taking too long
-
Beat cyber criminals at their own game
Whitepaper A guide to winning the vulnerability race and protection your organization
-
Same cyberthreat, different story
Whitepaper How security, risk, and technology asset management teams collaborate to easily manage vulnerabilities
-
Three steps to transforming security operations
Whitepaper How to be more agile, effective, collaborative, and scalable
-
Should your business start a bug bounty program?
In-depth Big tech firms including Google, Apple and Microsoft offer bug bounty programs, but can they benefit smaller businesses too?
-
Accessing the XDR realm
Whitepaper A guide for MSPs to unleash modern security
-
Why zero trust strategies fail
In-depth Zero Trust is the gold standard for organizations in protecting systems from cyber attacks, but there are many common implementation pitfalls businesses must avoid
-
Sitecore XP RCE flaw is being actively exploited, ACSC warns
News The vulnerability was fixed last month but hackers are now moving against patching laggards