Microsoft knew about IE bug since last year
Microsoft has explained that the complexities of fixing a bug in the system meant that it took more than a year to fix an IBM reported flaw.
Microsoft knew about an ActiveX control flaw that has now left Internet Explorer users vulnerable to attack, since last spring.
Mike Reavey, director of the Microsoft Security Response Centre, said in its blog that it received a report from the IBM ISS X-Force last year.
In an investigation it was confirmed that the ActiveX control shipping with Windows had an exploitable vulnerability.
The company didn't issue an advisory until this week, when reports first surfaced that hackers were taking advantage of the vulnerability to target Internet Explorer users.
Engineering teams believed that the best approach was to completely remove the ActiveX control from Internet Explorer, but it took some time for Microsoft to properly evaluate what this could do.
Reavey said that when disabling or removing functionality, Microsoft had to engage in more research and testing than usual. This ensured that it could take the step and not cause more harm than good by inadvertently breaking' applications.
He said: "For something like this, we have to ensure not only our applications but also major third-party applications are not hurt by this.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"Otherwise, if out update breaks' a major application, customers won't deploy the update but the bad guys will have information about the vulnerability they can use to attack it," Reavey added.
The Microsoft statement came as it revealed that at next week's Patch Tuesday it would release a total of six security bulletins with three critical updates for Windows.
The ActiveX flaw will be fixed, as well as an earlier vulnerability that affected Microsoft DirectX.
-
HPE's new Cray system is a pocket powerhouseNews Hewlett Packard Enterprise (HPE) had unveiled new HPC storage, liquid cooling, and supercomputing offerings ahead of SC25
-
High performance and long battery life: How Dell AI PCs offer the best of both worldsUnlocking the true potential of on-device AI requires a perfect balance between software and hardware
-
Vulnerability management complexity is leaving enterprises at serious riskNews Fragmented data and siloed processes mean remediation is taking too long
-
Beat cyber criminals at their own gameWhitepaper A guide to winning the vulnerability race and protection your organization
-
Same cyberthreat, different storyWhitepaper How security, risk, and technology asset management teams collaborate to easily manage vulnerabilities
-
Three steps to transforming security operationsWhitepaper How to be more agile, effective, collaborative, and scalable
-
Should your business start a bug bounty program?In-depth Big tech firms including Google, Apple and Microsoft offer bug bounty programs, but can they benefit smaller businesses too?
-
Accessing the XDR realmWhitepaper A guide for MSPs to unleash modern security
-
Why zero trust strategies failIn-depth Zero Trust is the gold standard for organizations in protecting systems from cyber attacks, but there are many common implementation pitfalls businesses must avoid
-
Sitecore XP RCE flaw is being actively exploited, ACSC warnsNews The vulnerability was fixed last month but hackers are now moving against patching laggards