The first application to identify that the Windowsupdate_x64.exe has a security vulnerability and could be used by hackers to get a full administrator account is the Windows Update service, which is used by Windows XP/Windows Vista. It is the part of the Windows server that processes the various updates to your system. This process checks the registry for the latest files and automatically forwards them to the Internet. After the latest update has been sent it will put the update onto a queue to be processed. It will then synchronize the content from the Windows Update server to the Windows Explorer (aka shell) cache.
What happens with the WindowsUpdate_x64.exe is that it will actually send the update to any Internet-connected computer that has Internet access. While this does not pose any threat, if you are running an ActiveX control (like scripts) it will also scan the cache file and some other files for activeX controls, some of which are viruses, Trojans and worms. This can take a lot of time if the firewall is turned on. Therefore, we need to identify whether the fix to this issue can be disabled by using the ‘disable development tools’ option when you install the Windows Updates. The answer is yes. After all, this is a relatively simple task as all you need to do is disable the debugging support on the Windows Update servers.
In order to enable the development debugging support, you have to first un-check the ‘enabled programs’ option in the Control Panel, and also check the box that says ‘Run this program as an administrator’. Once these steps are done, restart the Windows Update server and then run the Windowsupdate_x64.exe from an elevated command prompt.