• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
windows 10 users encounter ‘blue screen of death’ after latest

Windows 10 users encounter ‘blue screen of death’ after latest Patch Tuesday update

You are here: Home / General Cyber Security News / Windows 10 users encounter ‘blue screen of death’ after latest Patch Tuesday update
December 20, 2022

Getty Images

Microsoft has warned that some Windows 10 users may well experience the notorious ‘blue screen of death’ (BSOD) soon after putting in its newest ‘Patch Tuesday’ security updates.  

In an update on the Windows Overall health Dashboard, the corporation exposed that the blue display screen issue could affect picked users who downloaded the KB5021233 update in this month’s current raft of security fixes.  

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


KB5021233 was to begin with meant to solve an issue impacting the Digicam app soon after consumers described that the app stops responding when memory is low. 

The issue has so significantly influenced consumers running various unique variations of Windows 10, the company revealed, which include 22H2, 21H2, 21H1, and 20H2.  

Impacted consumers have been met with the BSOD and error code 0xc000021a on startup, and have been unable to entry products. 

“After setting up KB5021233, there could possibly be a mismatch among the file versions of hidparse.sys in c:/windows/process32 and c:/windows/program32/motorists (assuming Windows is set up to your C: travel), which may well trigger signature validation to fail when cleanup takes place,” Microsoft verified in its update over the weekend.  

How to repair the issue

Microsoft discovered it is at this time “working on a resolution” for the issue and mentioned it will give an update in an upcoming release.  

Having said that, for consumers currently afflicted by the dilemma, the firm offered a temporary workaround applying the Windows Recovery Setting (WinRE).  

“To mitigate this issue on gadgets currently going through it, you will have to have to use Windows Recovery Natural environment (WinRE),” Microsoft reported.  

The agency outlined the following steps for afflicted buyers: 

  • Enter Windows Recovery Atmosphere. If your gadget has not routinely started up into WinRE, you should see Entry points into WinRE. 
  • Pick out ‘Troubleshoot’ 
  • Select the ‘Start recovery, troubleshooting, and diagnostic tools button 
  • Decide on ‘Advanced Options’ 
  • Pick ‘Command Prompt’ and hold out for your device to restart, if needed. 
  • Your device must restart to a Command Prompt window. You might will need to signal into your system with your password prior to acquiring to the Command Prompt window
  • Run the following command (Vital: If Windows is not installed to C:windows you will require to modify the command to your atmosphere): xcopy C:windowssystem32drivershidparse.sys C:windowssystem32hidparse.sys 
  • As soon as the prior command completes, variety: exit 
  • Pick ‘Continue’ 
  • Immediately after following these steps, Microsoft said Windows really should now startup “as expected” for people. The organization also warned buyers against getting alternative workarounds.  

    “It is not recommended to follow any other workaround than those advisable higher than. We do not endorse deleting the hidparse.sys from your WindowsSystem32 folder,” the company reported. 

    Patch Tuesday  

    This distinct issue comes as a consequence of Microsoft’s latest Patch Tuesday update, issued on 13 December.  

    As section of the update, Microsoft patched a variety of critical vulnerabilities along with fixes for two critical zero-day vulnerabilities.  

    49 vulnerabilities ended up disclosed in the bulletin last 7 days. 6 ended up rated as ‘critical’ even though an additional was identified as obtaining been actively exploited in the wild.  

    The exploited bug, tracked as CVE-2022-44698, was observed to have an affect on Windows SmartScreen and enabled threat actors to bypass Mark of the Web (MOTW) protocols.


    Some sections of this report are sourced from:
    www.itpro.co.uk

    Previous Post: «kmsdbot botnet suspected of being used as ddos for hire service KmsdBot Botnet Suspected of Being Used as DDoS-for-Hire Service
    Next Post: A Guide to Efficient Patch Management with Action1 a guide to efficient patch management with action1»

    Reader Interactions

    Leave a Reply Cancel reply

    Your email address will not be published. Required fields are marked *

    Primary Sidebar

    Report This Article

    Recent Posts

    • WhatsApp Unveils Proxy Support to Tackle Internet Censorship
    • Hackers Using CAPTCHA Bypass Tactics in Freejacking Campaign on GitHub
    • Blind Eagle Hacking Group Targets South America With New Tools
    • US Family Planning Non-Profit MFHS Confirms Ransomware Attack
    • Microsoft Reveals Tactics Used by 4 Ransomware Families Targeting macOS
    • Dridex Malware Now Attacking macOS Systems with Novel Infection Method
    • Cyber attacks on UK organisations surged 77% in 2022, new research finds
    • WhatsApp to combat internet blackouts with proxy server support
    • The IT Pro Podcast: Going passwordless
    • Podcast transcript: Going passwordless

    Copyright © TheCyberSecurity.News, All Rights Reserved.