Microsoft has released an urgent security update to address a critical remote code execution vulnerability in the Windows TCP/IP stack. The flaw tracked as CVE-2024-38063, affects all supported Windows and Windows Server versions, including Server Core installations.
Let me guess. It’s going to be IPv6, right?
There it is!
Makes me glad I turned it off on the home network because I didn’t trust myself to be able to firewall it properly.
You are wise to be careful. Many home routers do not implement filtering this traffic correctly. I use it, but I had to perform a series of tests to ensure that restrictions are placed on accessibility of devices behind the firewall.