The Irish Government is not saying anything, but its security chief is telling the public that the vulnerabilities in Microsoft Edge are the result of a flaw in a piece of software called MSRPC.
He also says that the Government is looking into whether the flaw in MSRpc is related to the flaw known as the “Watson” exploit.
The flaw, which has not yet been publicly disclosed, allows attackers to remotely access websites using a simple command-and-control (C&C) server.
This can be used by the attacker to compromise the victim’s computer.
The Irish Government said it was aware of the vulnerability in MSRP and is in the process of “clarifying” its position.
But it said it does not know of any further attacks in this regard and was working with Microsoft to improve the security of Edge.
“We have a process in place which we are working through and we will be taking more action,” Minister for Communications Michael Creed said in a statement.
“We are also continuing to investigate the possibility of an impact to the Irish banking sector.”
The Government’s decision to release its full statement is likely to reignite concerns about the spread of malicious code.
Microsoft has not responded to requests for comment.
In a blog post, Microsoft said the flaw was discovered by a third party, and that it was patched on Wednesday.
The company said it had been in contact with the Government, and was investigating whether the vulnerability could be related to an existing issue.
This blog post from Microsoft makes it clear that the security flaw in Microsoft’s Edge browser is related, in part, to a vulnerability in the MSRP C&C server used to control MSRP.
The vulnerability is already known to some organisations.
Microsoft said it is working with the Irish government to determine if the vulnerability is related.
“Our investigation is ongoing and we are continuing to work with the authorities to confirm whether there is any impact to any Irish banks,” the company said.
We also look forward to working with them in the coming days to discuss further steps we can take to ensure that the risks of these issues are addressed.” “
The company is taking this issue very seriously and we have worked closely with the relevant authorities and their staff to understand the nature of the issue and work with them to address it.
We also look forward to working with them in the coming days to discuss further steps we can take to ensure that the risks of these issues are addressed.”
Microsoft also said it will update its web browser to the latest version.
“As soon as we have made the necessary updates, we will update our web browser as soon as possible,” a Microsoft spokesperson said.
Read more about security flaws: The security firm Trend Micro said the vulnerability was known by others, and the first to be publicly disclosed.
“It is likely that this is a vulnerability that was discovered and patched by someone working in a secure environment,” Trend Micro’s chief security officer Daniel Crammond said in an emailed statement.
It said it could be used to gain administrative access to a target’s system.
“This vulnerability could also allow attackers to gain access to sensitive data, including files, via remote code execution,” he said.