{"id":28299,"date":"2023-01-07T00:02:10","date_gmt":"2023-01-06T23:02:10","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=28299"},"modified":"2023-01-06T19:34:06","modified_gmt":"2023-01-06T18:34:06","slug":"0patch-secures-microsoft-edge-for-windows-7-server-2008-2012-r2-until-jan-2025","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2023\/01\/07\/0patch-secures-microsoft-edge-for-windows-7-server-2008-2012-r2-until-jan-2025\/","title":{"rendered":"0patch secures Microsoft Edge for Windows 7\/Server 2008\/2012\/R2 until Jan. 2025"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline; border-width: 0px;\" title=\"Edge\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2020\/01\/Edge.jpg\" alt=\"Edge\" width=\"65\" height=\"67\" align=\"left\" border=\"0\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/?p=276607\" target=\"_blank\" rel=\"noopener\">German<\/a>]On January 10, 2023, Windows 7 SP1 and Windows Server 2008\/R2 will receive security updates for the last time and will drop out of support. With this, Microsoft will also discontinue support for Edge on Windows 7 SP1, Windows Server 2008\/R2 and Windows Server 2012\/R2. ACROS Security has announced it will secure the Microsoft Edge browser for at least two years, until January 2025, after the browser is no longer supported by Microsoft on these platforms.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg04.met.vgwort.de\/na\/26cad5ea8d314513aaa392fd774ec835\" alt=\"\" width=\"1\" height=\"1\" \/>After all, there had been an announcement for some time that ACROS Security would secure Windows 7 and Windows Server 2008 R2 for two years beyond the end of support (January 10, 2023) using 0patch micropatches. I reported about this in the blog post <a href=\"https:\/\/borncity.com\/win\/2022\/10\/13\/windows-7-server-2008-r2-erhalten-auch-2023-und-2024-0patch-micropatches\/\">Windows 7\/Server 2008 R2 receive 0patch micropatches in 2023 and 2024<\/a>.<\/p>\n<p>However, Microsoft had discontinued support for the Microsoft Edge browser for Windows 7 SP1, Windows Server 2008\/R2 and Windows Server 2012\/R2 as of January 2023 (see <a href=\"https:\/\/borncity.com\/win\/2022\/10\/25\/windows-7-8-1-google-beendet-den-support-im-februar-2023-edge-auch-betroffen\/\">Windows 7\/8.1: Google ends support in February 2023, Edge also affected<\/a> and <a href=\"https:\/\/borncity.com\/win\/2022\/12\/09\/microsoft-edge-version-108-0-1462-46-reactivate-next-button-windows-7-8-1-support-ends-in-version-110\/\">Microsoft Edge: Version 108.0.1462.46; Reactivate Next button; Windows 7\/8.1 support ends in version 110<\/a>). This is especially unpleasant for Windows Server 2012 R2, as that platform will continue to receive security updates until October 2023. Microsoft Edge version 109 (to be deployed next week), will therefore be the last Edge version to run on all these Windows systems, but will no longer receive security patches.<\/p>\n<p>Now Mitja Kolsek, the founder of ACROS Security informed me a few hours ago that they plan to secure Microsoft Edge even after its support ends on Windows 7 SP1, Windows Server 2008\/R2 and Windows Server 2012\/R2.<\/p>\n<p><a href=\"https:\/\/twitter.com\/0patch\/status\/1611130610042474496\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"Edge secured with 0patch\" src=\"https:\/\/i.imgur.com\/KrFAOFN.png\" alt=\"Edge secured with 0patch\" \/><\/a><\/p>\n<p>Kolsek has made the details public in<a href=\"https:\/\/blog.0patch.com\/2022\/10\/free-micropatches-for-bypassing-motw.html\" target=\"_blank\" rel=\"noopener\"> this blog post<\/a>. The developers of 0patch have decided to provide the critical security patches for Edge version 109, so that it can safely continue to use on Windows 7, Windows Server 2008 R2 and Windows Server 2012 \/ R2.<\/p>\n<p>The prerequisite is that the Edge browser has been updated to version 109 on the systems and that the 0patch agent is running on the systems. Whenever critical vulnerabilities are discovered in Edge, 0patch will develop micropatches to close these vulnerabilities and deploy them via the agent. Edge security patches are part of the <a href=\"https:\/\/0patch.com\/pricing.html\" target=\"_blank\" rel=\"noopener\">Pro and Enterprise license<\/a>. So those who already use 0patch on their systems will automatically get Edge micropatches with these licenses at no additional cost.<\/p>\n<p>Initially, the plan is to support Microsoft Edge 109 until January 2025, when 0patch support for Windows 7 and Windows Server 2008 R2 will expire. Depending on demand, the developers want to consider a further extension of support.<\/p>\n<h2>The 0Patch solution<\/h2>\n<p>ACROS Security analyzes vulnerabilities and provides micropatches to close the security holes. The micropatches are loaded into memory at runtime via the 0patch agent and have the effect that the vulnerabilities can no longer be exploited. For notes on how the 0patch agent, which loads the micropatches into memory at an application's runtime, works, see blog posts (such as<a href=\"https:\/\/borncity.com\/win\/2020\/03\/05\/windows-7-securing-with-the-0patch-solution-part-2\/\"> this one<\/a>).<\/p>\n<p><strong>Similar articles<br \/>\n<\/strong><a href=\"https:\/\/borncity.com\/win\/2018\/09\/06\/wow-windows-7-get-extended-support-until-january-2023\/\">Wow! Windows 7 get extended support until January 2023<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2019\/02\/06\/costs-for-windows-7-extended-security-updates-till-2023\/\">Prices for Windows 7 Extended Security Updates till 2023<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2019\/08\/27\/windows-7-free-extended-update-support-and-usage\/\">Windows 7: Free Extended Update Support and usage<\/a><\/p>\n<p><a href=\"https:\/\/borncity.com\/win\/2020\/03\/05\/windows-7-securing-with-the-0patch-solution-part-2\/\">Windows 7: Securing with the 0patch solution \u2013 Part 2<\/a>\u00a0\u2013 Teil 2<br \/>\n<a href=\"https:\/\/borncity.com\/win\/2019\/09\/22\/windows-7-server-2008-r2-0patch-liefert-sicherheitspatches-nach-supportende\/\">Windows 7\/Server 2008\/R2: 0patch delivers security patches after support ends<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/01\/30\/project-windows-7-server-2008-r2-life-extension-0patch-one-month-trial\/\">Project: Windows 7\/Server 2008\/R2 Life Extension &amp; 0patch one month trial<\/a><\/p>\n<p><a href=\"https:\/\/borncity.com\/win\/2020\/01\/21\/0patch-fix-for-internet-explorer-0-day-vulnerability-cve-2020-0674\/\">0patch: Fix for Internet Explorer 0-day vulnerability CVE-2020-0674<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/03\/14\/0patch-fix-for-windows-installer-flaw-cve-2020-0683\/\">0patch: Fix for Windows Installer flaw CVE-2020-0683<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/03\/20\/0patch-fix-for-windows-gdi-vulnerability-cve-2020-0881\/\">0patch fix for Windows GDI+ vulnerability CVE-2020-0881<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/03\/24\/0-day-vulnerability-in-windows-adobe-type-library\/\">0-day vulnerability in Windows Adobe Type Library<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/04\/23\/0patch-fixt-cve-2020-0687-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-0687 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/05\/21\/0patch-fixes-cve-2020-1048-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1048 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/05\/27\/0patch-fixt-cve-2020-1015-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1015 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/07\/10\/0patch-fr-0-day-rce-schwachstelle-in-zoom-fr-windows\/\">0patch for 0-day RCE vulnerability in Zoom for Windows<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/07\/18\/windows-server-2008-r2-0patch-fixes-sigred-vulnerability\/\">Windows Server 2008 R2: 0patch fixes SIGRed vulnerability<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/08\/12\/0patch-fixt-cve-2020-1113-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1113 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/09\/02\/0patch-fixt-cve-2020-1337-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1337 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/09\/11\/0patch-fixt-cve-2020-1530-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1530 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/09\/18\/0patch-fixt-zerologon-cve-2020-1472-in-windows-server-2008-r2\/\">0patch fixes Zerologon (CVE-2020-1472) vulnerability in Windows Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/web.archive.org\/web\/20210621200302\/https:\/\/borncity.com\/win\/2020\/10\/17\/0patch-fixt-cve-2020-1062-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1062 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/11\/19\/0patch-fixt-cve-2020-1300-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1300 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/11\/26\/0patch-fixt-0-day-schwachstelle-in-windows-7-server-2008-r2\/\">0patch fixes 0-day vulnerability in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/12\/24\/0patch-fixt-cve-2020-1013-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1013 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/01\/08\/0patch-fixt-local-privilege-escalation-0-day-in-sysinternals-psexec\/\">0patch fixes a Local Privilege Escalation 0-day in Sysinternals PsExec<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/01\/28\/0patch-fixt-windows-installer-0-day-local-privilege-escalation-schwachstelle\/\">0patch fixes Windows Installer 0-day Local Privilege Escalation vulnerability<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/02\/08\/0patch-fixt-0-day-im-internet-explorer\/\">0patch fixes 0-day in Internet Explorer<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/03\/24\/0patch-fixt-cve-2021-2687-im-dns-server-von-windows-server-2008-r2\/\">0patch fixes CVE-2021-26877 in the DNS server of Windows Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/05\/07\/0patch-fixt-windows-installer-lpe-bug-cve-2021-26415\/\">0patch fixes Windows Installer LPE-Bug (CVE-2021-26415)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/05\/18\/0patch-bietet-support-fr-windows-10-version-1809-nach-eol\/\">0Patch provides support for Windows 10 version 1809 after EOL<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/06\/21\/windows-10-v180x-0patch-fixt-ie-schwachstelle-cve-2021-31959\/\">Windows 10 V180x: 0Patch fixes IE vulnerability CVE-2021-31959<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/07\/03\/0patch-micropatches-fr-printnightmare-schwachstelle-cve-2021-34527\/\">0Patch Micropatches for PrintNightmare Vulnerability (CVE-2021-34527)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/08\/06\/0patch-fix-fr-neue-windows-printnightmare-0-day-schwachstelle-5-aug-2021\/\">0patch fix for new Windows PrintNightmare 0-day vulnerability (Aug. 5, 2021)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/08\/07\/0patch-fix-fr-windows-petitpotam-0-day-schwachstelle-6-aug-2021\/\">0patch fix for Windows PetitPotam 0-day vulnerability (Aug. 6, 2021)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/08\/20\/2-0patch-fix-fr-windows-petitpotam-0-day-schwachstelle-19-aug-2021\/\">2nd 0patch fix for Windows PetitPotam 0-day vulnerability (Aug. 19, 2021)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/09\/27\/windows-10-0patch-fix-fr-mshtml-schwachstelle-cve-2021-40444\/\">Windows 10: 0patch fix for MSHTML vulnerability (CVE-2021-40444)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/11\/13\/0patch-fixt-lpe-schwachstelle-cve-2021-34484-in-windows-user-profile-service\/\">0patch fixes LPE Vulnerability (CVE-2021-34484) in Windows User Profile Service<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/11\/27\/0patch-fixt-lpe-schwachstelle-cve-2021-24084-in-mobile-device-management-service\/\">0patch fixes LPE vulnerability (CVE-2021-24084) in Mobile Device Management Service<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/12\/03\/0patch-fixt-installertakeover-lpe-schwachstelle-in-windows\/\">0patch fixes InstallerTakeOver LPE 0-day vulnerability in Windows<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/12\/24\/0patch-fixt-ms-officecmd-rce-schwachstelle-in-windows\/\">0patch fixes ms-officecmd RCE vulnerability in Windows<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2022\/01\/14\/0patch-fixt-remotepotato0-schwachstelle-in-windows\/\">0patch fixes RemotePotato0 vulnerability in Windows<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2022\/03\/22\/0patch-fixt-erneut-schwachstelle-cve-2021-34484-in-windows-10-server-2019\/\">0patch fixes again vulnerability CVE-2021-34484 in Windows 10\/Server 2019<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2022\/05\/18\/0patch-fixt-schwachstellen-cve-2022-26809-and-cve-2022-22019-in-windows\/\">0Patch fixes vulnerabilities (CVE-2022-26809 and CVE-2022-22019) in Windows<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2022\/06\/10\/windows-msdt-0-day-schwachstelle-dogwalk-erhlt-0patch-fix\/\">Windows MSDT 0-day vulnerability \"DogWalk\" receives 0patch fix<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2022\/07\/01\/0patch-fixes-all-known-and-exploitable-windows-ntlm-kerberos-vulnerabilities\/\">0patch fixes all known and exploitable Windows NTLM\/Kerberos vulnerabilities<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2022\/09\/15\/0patch-fixt-memory-corruption-schwachstelle-cve-2022-35742-in-microsoft-outlook-2010\/\">0patch fixes Memory Corruption vulnerability (CVE-2022-35742) in Microsoft Outlook 2010<\/a><\/p>\n<p><a href=\"https:\/\/borncity.com\/win\/2022\/10\/13\/windows-7-server-2008-r2-erhalten-auch-2023-und-2024-0patch-micropatches\/\">Windows 7\/Server 2008 R2 receive 0patch micropatches in 2023 and 2024<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2022\/10\/18\/windows-0patch-micropatch-fr-motow-zip-file-bug-kein-cve\/\">Windows: 0Patch Micropatch for MOTOW ZIP file bug (0-day, no CVE)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2022\/10\/29\/windows-0patch-micropatche-fr-motw-bypassing-0-day-kein-cve\/\" rel=\"bookmark\">Windows: 0Patch micropatch for MotW bypassing 0-day (no CVE)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]On January 10, 2023, Windows 7 SP1 and Windows Server 2008\/R2 will receive security updates for the last time and will drop out of support. With this, Microsoft will also discontinue support for Edge on Windows 7 SP1, Windows Server &hellip; <a href=\"https:\/\/borncity.com\/win\/2023\/01\/07\/0patch-secures-microsoft-edge-for-windows-7-server-2008-2012-r2-until-jan-2025\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[872,580,2],"tags":[320,69,194],"class_list":["post-28299","post","type-post","status-publish","format-standard","hentry","category-browser","category-security","category-windows","tag-edge","tag-security","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/28299","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=28299"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/28299\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=28299"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=28299"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=28299"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}