TA14-069A: Microsoft Ending Support for Windows XP and Office 2003

11/03/14, TA14-069A: Microsoft Ending Support for Windows XP and Office 2003
From: "US-CERT" <US-CERT@ncas.us-cert.gov>

Generated by MHonArc

CSIM Logo WelcomeCourses
Faculty, Student, Staff
Projects and reports
Conferences, workshop and seminars
Laboratories and reasearch facilities
Information related to CSIM
Information non-related to CSIM
Address, map, phone, etc.

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

To: on@cs.ait.ac.th
Subject: TA14-069A: Microsoft Ending Support for Windows XP and Office 2003
From: "US-CERT" <US-CERT@ncas.us-cert.gov>
Date: Mon, 10 Mar 2014 14:20:58 -0500
Authentication-results: mail.cs.ait.ac.th (amavisd-new); dkim=pass (2048-bit key) header.d=ncas.us-cert.gov
Delivered-to: on@cs.ait.ac.th
Dkim-signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=ncas.us-cert.gov; s=13q3; i=@ncas.us-cert.gov; h=Content-Transfer-Encoding: Content-Type:x-subscriber2:x-subscriber:X-AccountCode:Errors-To: Reply-To:MIME-Version:Message-ID:X-ReportingKey:Subject:Date:To: From; bh=LWu/0t4exWrEOvil61eHkyiTpmw=; b=K3QJo5h9PkxSOKsvuMeuAIC Fq8Qbs6FEt16Yk6MmkJvYZzJ6p6LpycO4r6kvDX3/YzzadTPuERZVGD+VLlQVDvt HpY7N6evsCQtvIeN13c+Lwm7sJP6A8iU1MIRxAQk4tYxiFofA8G3XP2SXqYifmve 7SEq+VpNkd2bv1WamHcmEfg8aIZdCXh3lNs+KgzQJQOfTf6kcFeGoDj9/cG3F0Yq HrH1oZf5hHCMcQTGwHDAvMyVFIjUz/Ey3aRaf50XXbMCkj4Oob3wVbQISRdwq68g 9lREXTRyjn/odvGjGYQ9u9oVVqeEpbMaHsFh87Ifv1ZI6rQ/qLCUya3GPyJASEQ= =
Reply-to: US-CERT@ncas.us-cert.gov

Title: TA14-069A: Microsoft Ending Support for Windows XP and Office 2003


National Cyber Awareness System:

03/10/2014 10:56 AM EDT

Original release date: March 10, 2014

Systems Affected

  • Microsoft Windows XP with Service Pack 3 (SP3) Operating System
  • Microsoft Office 2003 Products


Microsoft is ending support for the Windows XP operating system and Office 2003 product line on April 8, 2014. [1] After this date, these products will no longer receive:

  • Security patches which help protect PCs from harmful viruses, spyware, and other malicious software
  • Assisted technical support from Microsoft
  • Software and content updates


All software products have a lifecycle. End of support refers to the date when Microsoft no longer provides automatic fixes, updates, or online technical assistance. [2] As of February 2014, nearly 30 percent of Internet-connected PCs still run Windows XP. [3]

Microsoft will send “End of Support” notifications to users of Windows XP who have elected to receive updates via Windows Update. Users in organizations using Windows Server Update Services (WSUS), System Center Configuration manager, or Windows Intune will not receive the notification. [4]


Computer systems running unsupported software are exposed to an elevated risk to cybersecurity dangers, such as malicious attacks or electronic data loss.

Users may also encounter problems with software and hardware compatibility since new software applications and hardware devices may not be built for Windows XP or Office 2003.

Organizations that are governed by regulatory obligations may find they are no longer able to satisfy compliance requirements. [4]


Computers operating Windows XP with SP3 or running Office 2003 products will continue to work after support ends. However, using unsupported software may increase the risk of viruses and other security threats.

Users have the option to upgrade to a currently supported operating system or office productivity suite. The Microsoft “End of Support” pages for Windows XP and Office 2003 offer additional details.

There are software vendors and service providers in the marketplace who offer assistance in migrating from Windows XP or Office 2003 to a currently supported operating system or office productivity suite. US-CERT does not endorse or support any particular product or vendor.

Users who choose to continue using Windows XP after the end of support may mitigate some risks by using a web browser other than Internet Explorer. The Windows XP versions of some alternative browsers will continue to recieve support temporarily. Users should consult the support pages of their chosen alternative browser for more details.


Revision History

  • March 10, 2014 - Initial Release

This product is provided subject to this Notification and this Privacy & Use policy.

This email was sent to on@cs.ait.ac.th using GovDelivery, on behalf of: United States Computer Emergency Readiness Team (US-CERT) · 245 Murray Lane SW Bldg 410 · Washington, DC 20598 · (703) 235-5110 Powered by GovDelivery

Previous message sorted by date: TA14-017A: UDP-based Amplification Attacks
Next message sorted by date: TA14-098A: OpenSSL 'Heartbleed' vulnerability (CVE-2014-0160)
Previous message sorted by thread: TA14-017A: UDP-based Amplification Attacks
Next message by thread: TA14-098A: OpenSSL 'Heartbleed' vulnerability (CVE-2014-0160)
Main Index
Thread Index

CSIM home pageWMailAccount managementCSIM LibraryNetwork test toolsSearch CSIM directories
Contact us: Olivier Nicole CSIM    SET    AIT Last update: Apr 2014