Follow-up to Critical Vulnerability in Windows CVE-2024-38063
IT colleagues:
This is a follow-up to the earlier communication concerning the vulnerability in the IPv6 subsystem for Windows.
Due to the potential seriousness of this update, UITS Endpoint Management Services will be pushing out this update as an essential change for devices on the IU Common Build and HTS build this evening. This update may cause some devices to reboot.
For workstations and servers not on the IU Common Build, it is strongly recommended that you update as soon as possible. If there is evidence of exploitation of this vulnerability, IU may need to take more aggressive action.
Please contact uiso@iu.edu with questions about the vulnerability or sct2@iu.edu with questions about the IU Common Build update.
–IT Community Partnerships on behalf of Endpoint Management Services