Microsoft pushed out another fix for the virus scanning engine in Windows Defender called the MsMpEng malware protection engine.

The newest flaw in MsMpEng’s emulator

This latest vulnerability was discovered by Google’s Project Zero researcher Tavis Ormandy. This time, he disclosed it to Microsoft in a private manner. This fresh vulnerability allows apps executed in MsMpEng’s emulator to control it in such a way to achieve all kinds of malicious behavior, including remote execution of code when Windows Defender scans an executable file sent via email. This new vulnerability was not as easy to exploit as the one discovered two weeks ago but is still a pretty grave.

The engine is updated regularly to prevent more issues

The emulator’s job is to emulate the user’s CPU but in a very strange way that allows API calls. What’s unclear are the reasons why the company created special instructions for the emulator, according to the Google Project Zero’s researcher.

MsMpEng is not sandboxed, which means that if you can exploit a vulnerability, the result will turn out very negative.

Fortunately, the engine is updated on a regular basis for a greater level of security. In addition, Microsoft is under increased pressure to secure its software and the company is asking governments for as much cooperation as possible to keep users safe.

RELATED STORIES TO CHECK OUT:

  • Download Windows Defender KB4022344 to stop WannaCry ransomware
  • Windows 10 build 16188 introduces Windows Defender Application Guard
  • Microsoft fixed another severe vulnerability in Windows Defender

If the advices above haven’t solved your issue, your PC may experience deeper Windows problems. We recommend downloading this PC Repair tool (rated Great on TrustPilot.com) to easily address them. After installation, simply click the Start Scan button and then press on Repair All.

Still having issues? Fix them with this tool:

SPONSORED

  • Windows Defender issues

Email *

Commenting as . Not you?

Comment