Read the affiliate disclosure page to find out how can you help Windows Report effortlessly and without spending any money. Read more
Your all-time Windows MVP, Cortana can become your enemy due to a Windows 10 bug that allows cyber criminals to attack a computer really easy even when the device is locked. Attackers can make the assistant execute the commands they need and hijack your system.
McAfee published a detailed analysis of the vulnerability
McAfee issued a detailed report of this vulnerability to explain how it works. It seems that the “Hey, Cortana!” voice command which is enabled by default in Windows 10 can be used even from the lock screen when your computer is locked. This allows hackers to see file data, content and even to execute arbitrary code.
The research explains that it’s possible for hackers to type and launch a Windows contextual menu when Cortana starts to listen to a query on a locked device. This seems to be the first step towards a successful hack.
McAfee details more potential solutions to get rid of the vulnerability but claims that one of these viable solutions in the simplest and basically recommends users to go with it. Here it is as it’s noted on McAfee’s official post:
- Trigger Cortana via “Tap and Say” or “Hey Cortana”
- Ask a question (this is more reliable) such as “What time is it?”
- Press the space bar, and the context menu appears
- Press esc, and the menu disappears
- Press the space bar again, and the contextual menu appears, but this time the search query is empty
- Start typing (you cannot use backspace). If you make a mistake, press esc and start again.
- When done (carefully) typing your command, click on the entry in the Command category. (This category will appear only after the input is recognized as a command.)
- You can always right click and select “Run as Administrator” (but remember the user would have to log in to clear the UAC)
To get rid of the flaw you can follow McAfee’s recommendations or turn off Cortana if you haven’t received Microsoft’s patch by now. You can read McAfee’s entire post to find out the complete details on this vulnerability here.
RELATED STORIES TO CHECK OUT: