an emergency patch for Internet Explorer to fixVulnerability-related.PatchVulnerabilitya zero-day vulnerability in the web browser . The problem affectsVulnerability-related.DiscoverVulnerabilityversions of Internet Explorer from 9 to 11 across multiple versions of Windows , but it seems that the patch has been causing problems for many people . Specifically , people with some Lenovo laptops have found that after installingVulnerability-related.PatchVulnerabilitythe KB4467691 patch they are unable to start Windows . When the patch was releasedVulnerability-related.PatchVulnerability, it was known that there were a few issues with older versions of Windows 10 -- for example , problems with the .NET framework , and with web links in the Start menu . But since the initial release , Microsoft has updatedVulnerability-related.PatchVulnerabilitythe patch page to indicateVulnerability-related.DiscoverVulnerabilitya further potential problem with some Lenovo laptops : After installing KB4467691 , Windows may fail to startup on certain Lenovo laptops that have less than 8 GB of RAM . The company goes on to suggest a couple of possible workarounds for those running into issues : Restart the affected machine using the Unified Extensible Firmware Interface ( UEFI ) . Disable Secure Boot and then restart . If BitLocker is enabled on your machine , you may have to go through BitLocker recovery after Secure Boot has been disabled . Microsoft says that it is `` working with Lenovo and will provideVulnerability-related.PatchVulnerabilityan update in an upcoming release '' .
While combing through WikiLeaks’ Vault 7 data dumpAttack.Databreach, Cisco has unearthedVulnerability-related.DiscoverVulnerabilitya critical vulnerability affecting 300+ of its switches and one gateway that could be exploitedVulnerability-related.DiscoverVulnerabilityto take over the devices . The flaw is presentVulnerability-related.DiscoverVulnerabilityin the Cisco Cluster Management Protocol ( CMP ) processing code in Cisco IOS and Cisco IOS XE Software . “ The vulnerability is due to the combination of two factors : the failure to restrict the use of CMP-specific Telnet options only to internal , local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device , and the incorrect processing of malformed CMP-specific Telnet options , ” Cisco explained . An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device ” . The extensive and complete list of affected devices is provided in the security advisory . Cisco says that they are not aware of any public announcements or active malicious use of the vulnerability , and that they will provideVulnerability-related.PatchVulnerabilityfree software updates to addressVulnerability-related.PatchVulnerabilityit ( they don ’ t say when ) . In the meantime , users can mitigate the risk by disabling the Telnet protocol and switching to using SSH . If that ’ s not possible , they can reduce the attack surface by implementing infrastructure access control lists . It also includes indicators of compromise that can be used to detect exploitation attempts