An Israeli software specialist is urging customers to upgrade their software to fix a critical security flaw that allows hackers to take over a computer’s temperature and send out an alert that can then trigger a password reset, the Israeli website Ynet reported.
“I’ve been working on a project for the past two years on how to solve the computer cold sensor issue,” the software specialist said in a video posted on Facebook on Sunday, adding that it is “the most critical software vulnerability in the world.”
“This is a serious vulnerability that is not in the software, but in the hardware of the computer, which makes it more dangerous and more difficult to fix,” he said.
The software specialist was also quoted as saying that he has received “tens of thousands” of emails, and that “we have received more than 500 requests” for software updates.
“We’re not asking for any software, we’re asking for hardware,” he added.
The vulnerability affects Microsoft’s Windows operating system and a number of other major platforms, including Apple’s Mac OS X operating system, and Google’s Chrome operating system.
It can be exploited to take control of a computer by sending an unencrypted SMS message to the user’s mobile phone, which can then cause the computer to start automatically.
In addition to this, the vulnerability also allows an attacker to cause a computer to perform a “man in the middle” attack that would redirect the user to a website that contains malicious code, while another attack could then be performed by stealing a user’s credit card information.
According to a report by cybersecurity firm FireEye, the flaw could be exploited in the wild in the form of a “malicious remote code execution vulnerability” in software, or malware.
In a statement, Microsoft said: “Our researchers are investigating this vulnerability.
The vulnerability was discovered in the Windows version of the software.
We have been working closely with Microsoft to address this vulnerability in Windows, and we will be releasing a patch to address it soon.”
“Our engineers are working on mitigating this issue and are working with the affected manufacturers to address the vulnerability, which will be available later this week,” the company said.
The company added that “our engineers are actively working on identifying the root cause of the vulnerability and have identified a number ways to protect against this vulnerability and will make further improvements in the near future.”
“We are continuing to work closely with industry partners and partners of the security community to improve the best security practices,” the statement continued.
The company said that it had taken steps to protect its customers from the problem, including requiring that customers provide access to their PCs to secure the servers and “monitoring” the network traffic of any affected computers.
According to FireEye’s report, the company’s fix “has been approved by the vendor for Windows Server 2012 R2, Windows Server 2013, and Windows Server 2016, and will be installed in the next update.”
FireEye said it also identified a vulnerability in Microsoft’s own Windows operating systems, including Windows 8, Windows 8.1, Windows 10, and Microsoft’s Office software, which could allow an attacker with access to a Windows system to cause it to crash or to perform an “invalid operation”.
The company also noted that Microsoft’s software “can be configured to monitor and protect the Windows environment, and can be used to monitor network traffic.”
Microsoft’s security researcher, Jens Schmitt, who also works for FireEye in his current role, has also warned that hackers could potentially exploit this vulnerability to steal passwords.
“If someone knows how to exploit this security hole, they could use it to steal users’ passwords,” Schmitt said in the report.
Fireeye’s report comes a day after Israeli authorities reported that the country’s computer systems were breached by hackers using “malware”.
In an incident reported on Sunday night, security company Secureworks said that the hackers broke into a system owned by a company that sells computer monitoring software to businesses.
According to the report, Secureworks found that the attackers used the company as a front for a campaign to gain access to the company servers, where they stole personal data and a database containing sensitive information, including passwords.
The attackers used an exploit in a tool known as “Shellshock”, which allows attackers to bypass passwords and to install malicious programs.
After the attack, the attackers were able to install malware on Secureworks systems.
It is unclear what role the hackers had in the attack.
Secureworks said in its report that it was investigating the security breach and that it would release an update soon.