Today Microsoft realeased a number of Wiindows patches, the most important of which relates to a remote code execution vulnerability in the DNSAPI dynamic link library. The DNSAPI is used for Domain Name System (DNS) resolution and is a required component for a Windows-based machine to communicate over a computer network. Platforms affected include all versions of the following operating systems: Windows 7, Windows 8, Windows 10, Windows Server 2008, Windows Server 2012, and Windows Server 2016.
For those subscribed to the MIT Windows Automatic Update Service (WAUS), these patches were already released and no further action needs to be taken. For all others, IS&T strongly recommends that you install the June Cumulative Security Update and restart affected machines as soon as possible. There are no known workarounds short of disabling network interfaces on a vulnerable system.