Microsoft patches critical vulnerabilities in Windows Defender

Microsoft has identified two critical vulnerabilities in Windows Defender, the built-in security tool for the Windows operating system. According to Bleeping Computer, citing technical documentation from the company, these flaws allowed for denial-of-service attacks. This was reported by Ixbt.com reports .
The identified issues related to the Malware Protection Engine, which is responsible for scanning and processing potentially malicious files. If an attacker successfully exploited these vulnerabilities, they could disrupt the stability of the security mechanism and cause failures in the Windows security system.
The company has already released patches distributed via automatic updates. Specifically, versions 1.1.26040.8 and 4.18.26040.7 of the Malware Protection Engine fully resolve these issues. Microsoft representatives noted that users with automatic updates enabled will be protected without any additional action.
Nevertheless, experts recommend manually checking for updates via Windows Security settings. To do this, go to the Virus and threat protection section and run updates under Protection updates. You can also verify that the antivirus engine version matches the numbers mentioned above in the About section.
Currently, there is no confirmed evidence that these vulnerabilities have been exploited in the wild. Microsoft reiterates that keeping the system updated is the most effective way to protect against cyberattacks.













