Microsoft has warned that some Windows 10 users may well experience the notorious ‘blue screen of death’ (BSOD) soon after putting in its newest ‘Patch Tuesday’ security updates.
In an update on the Windows Overall health Dashboard, the corporation exposed that the blue display screen issue could affect picked users who downloaded the KB5021233 update in this month’s current raft of security fixes.
KB5021233 was to begin with meant to solve an issue impacting the Digicam app soon after consumers described that the app stops responding when memory is low.
The issue has so significantly influenced consumers running various unique variations of Windows 10, the company revealed, which include 22H2, 21H2, 21H1, and 20H2.
Impacted consumers have been met with the BSOD and error code 0xc000021a on startup, and have been unable to entry products.
“After setting up KB5021233, there could possibly be a mismatch among the file versions of hidparse.sys in c:/windows/process32 and c:/windows/program32/motorists (assuming Windows is set up to your C: travel), which may well trigger signature validation to fail when cleanup takes place,” Microsoft verified in its update over the weekend.
How to repair the issue
Microsoft discovered it is at this time “working on a resolution” for the issue and mentioned it will give an update in an upcoming release.
Having said that, for consumers currently afflicted by the dilemma, the firm offered a temporary workaround applying the Windows Recovery Setting (WinRE).
“To mitigate this issue on gadgets currently going through it, you will have to have to use Windows Recovery Natural environment (WinRE),” Microsoft reported.
The agency outlined the following steps for afflicted buyers:
Immediately after following these steps, Microsoft said Windows really should now startup “as expected” for people. The organization also warned buyers against getting alternative workarounds.
“It is not recommended to follow any other workaround than those advisable higher than. We do not endorse deleting the hidparse.sys from your WindowsSystem32 folder,” the company reported.
This distinct issue comes as a consequence of Microsoft’s latest Patch Tuesday update, issued on 13 December.
As section of the update, Microsoft patched a variety of critical vulnerabilities along with fixes for two critical zero-day vulnerabilities.
49 vulnerabilities ended up disclosed in the bulletin last 7 days. 6 ended up rated as ‘critical’ even though an additional was identified as obtaining been actively exploited in the wild.
The exploited bug, tracked as CVE-2022-44698, was observed to have an affect on Windows SmartScreen and enabled threat actors to bypass Mark of the Web (MOTW) protocols.
Some sections of this report are sourced from: