Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Defender Incorrectly Flags SQL Server Software as End-of-life

Posted on October 10, 2025October 10, 2025 By CWS

Microsoft Defender for Endpoint is incorrectly flagging particular variations of SQL Server as having reached their end-of-life, inflicting potential confusion for system directors.

The problem, tracked underneath advisory DZ1168079, stems from a code bug and impacts the Menace and Vulnerability Administration characteristic throughout the Microsoft Defender XDR suite.

The bug impacts explicitly organizations working SQL Server 2017 and 2019. Inside the Microsoft Defender for Endpoint portal, directors may even see an “Finish-Of-Assist” (EOS) tag incorrectly utilized to those software program variations.

Microsoft has clarified that whereas the EOS tag is misguided, the related vulnerability suggestions are official and may nonetheless be addressed.

This mislabeling creates a complicated scenario the place directors should act on legitimate safety alerts whereas ignoring the inaccurate end-of-life standing.

The scope of the affect is important, because it may have an effect on any setting utilizing these extensively deployed SQL Server variations with Defender for Endpoint for safety administration.

This will result in misprioritization of duties as groups might mistakenly imagine they should carry out pressing software program upgrades.

Root Trigger And Preliminary Response

In accordance with Microsoft, the issue originated from a latest change associated to Finish-Of-Assist software program detection that launched a code concern.

The service degradation formally started on Wednesday, October 8, 2025, though Microsoft’s incident timeline traces the beginning of the affect again to Monday, September 29, 2025. Initially, the corporate reported that customers is likely to be seeing false optimistic vulnerability suggestions.

Nevertheless, after additional investigation, it was decided that the vulnerability studies have been correct, however the EOS tags have been being incorrectly utilized.

In response, Microsoft developed a repair supposed to appropriate the defective code and commenced deploying it to its take a look at setting for validation earlier than a wider rollout.

Regardless of the preliminary remediation efforts, the issue persists. Microsoft confirmed on Thursday, October 9, that after deploying the repair, the wrong end-of-life tagging was nonetheless occurring for some customers.

This means that the primary tried answer was not fully efficient. The corporate’s engineers at the moment are investigating what extra actions are obligatory to make sure the repair is utilized accurately and resolves the problem for all affected prospects.

The service standing stays at “serviceDegradation,” and Microsoft has dedicated to offering its subsequent replace on the scenario by Sunday, October 12, 2025.

Within the meantime, directors are suggested to acknowledge the legitimacy of the vulnerability alerts for SQL Server 2017 and 2019 however disregard the inaccurate end-of-life notifications.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Defender, Endoflife, Flags, Incorrectly, Microsoft, Server, Software, SQL

Post navigation

Previous Post: Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation
Next Post: RondoDox Botnet Takes ‘Exploit Shotgun’ Approach

Related Posts

Microsoft to Limit Onmicrosoft Domain Usage for Sending Emails Cyber Security News
Cloud Security Essentials – Protecting Multi-Cloud Environments Cyber Security News
Netwrix Password Manager Vulnerability Allows Authenticated Remote Code Execution Cyber Security News
Hackers Can Exfiltrate Windows Secrets and Credentials Silently by Evading EDR Detection Cyber Security News
NVIDIA Triton Vulnerability Chain Let Attackers Take Over AI Server Control Cyber Security News
Behavioral Monitoring for Real-Time Endpoint Threat Detection Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Chaosbot Leveraging CiscoVPN and Active Directory Passwords to Execute Network Commands
  • Threat Actors Exploiting SonicWall SSL VPN Devices in Wild to Deploy Akira Ransomware
  • Nanoprecise partners with AccuKnox to strengthen its Zero Trust Cloud Security and Compliance Posture
  • Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers
  • In Other News: Gladinet Flaw Exploitation, Attacks on ICS Honeypot, ClayRat Spyware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Chaosbot Leveraging CiscoVPN and Active Directory Passwords to Execute Network Commands
  • Threat Actors Exploiting SonicWall SSL VPN Devices in Wild to Deploy Akira Ransomware
  • Nanoprecise partners with AccuKnox to strengthen its Zero Trust Cloud Security and Compliance Posture
  • Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers
  • In Other News: Gladinet Flaw Exploitation, Attacks on ICS Honeypot, ClayRat Spyware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News