Microsoft to release patch specifically for Windows 7 en XP to prevent a new WannaCry
Microsoft will or already has released a patch that addresses a big vulnerability in Remote Desktop Services. The company says it wants to "prevent a new attack like WannaCry." The patch is only released for older Windows versions, including Windows 7 and XP.
-- Microsoft --
Today Microsoft released fixes for a critical Remote Code Execution vulnerability, CVE-2019-0708, in Remote Desktop Services – formerly known as Terminal Services – that affects some older versions of Windows. The Remote Desktop Protocol (RDP) itself is not vulnerable. This vulnerability is pre-authentication and requires no user interaction. In other words, the vulnerability is ‘wormable’, meaning that any future malware that exploits this vulnerability could propagate from vulnerable computer to vulnerable computer in a similar way as the WannaCry malware spread across the globe in 2017. While we have observed no exploitation of this vulnerability, it is highly likely that malicious actors will write an exploit for this vulnerability and incorporate it into their malware.
Now that I have your attention, it is important that affected systems are patched as quickly as possible to prevent such a scenario from happening. In response, we are taking the unusual step of providing a security update for all customers to protect Windows platforms, including some out-of-support versions of Windows.
Vulnerable in-support systems include Windows 7, Windows Server 2008 R2, and Windows Server 2008. Downloads for in-support versions of Windows can be found in the Microsoft Security Update Guide. Customers who use an in-support version of Windows and have automatic updates enabled are automatically protected.
Out-of-support systems include Windows 2003 and Windows XP. If you are on an out-of-support version, the best way to address this vulnerability is to upgrade to the latest version of Windows. Even so, we are making fixes available for these out-of-support versions of Windows in KB4500705.
Customers running Windows 8 and Windows 10 are not affected by this vulnerability, and it is no coincidence that later versions of Windows are unaffected. Microsoft invests heavily in strengthening the security of its products, often through major architectural improvements that are not possible to backport to earlier versions of Windows.
There is partial mitigation on affected systems that have Network Level Authentication (NLA) enabled. The affected systems are mitigated against ‘wormable’ malware or advanced malware threats that could exploit the vulnerability, as NLA requires authentication before the vulnerability can be triggered. However, affected systems are still vulnerable to Remote Code Execution (RCE) exploitation if the attacker has valid credentials that can be used to successfully authenticate.
It is for these reasons that we strongly advise that all affected systems – irrespective of whether NLA is enabled or not – should be updated as soon as possible.
Resources
- Links to downloads for Windows 7, Windows 2008 R2, and Windows 2008
- Links to downloads for Windows 2003 and Windows XP
Microsoft begins notifying users about ending Windows 7 support - 04/23/2019 12:31 PM
Microsoft started a campaign in which they are actively sending notifications to Windows 7 users and warns them that support for this operating system will end January 14, 2020. Those who still work w...
Promo: Grab Microsoft Office 2016 Pro and Windows 10 Pro for just $34 - 04/19/2019 09:02 AM
URCDKey is a license sites available for various platforms, whether for software or games. This time URCDKeys brings an offer at a competitive price, Microsoft Windows 10 Pro OEM and Office 2016 combo...
Microsoft to offer users more flexibility with Windows 10 major updates - 04/08/2019 08:48 AM
Microsoft has the intention to bring more control over OS updates from the upcoming Windows 10 May 2019 Update towards you guys. Users can decide for themselves if and when to install the feature upda...
Microsoft removes safe removal of USB drives as the default option - 04/08/2019 08:09 AM
You know, ever since the beginning of windows and USB you'd always get that message that the USB drive needs to be "safely removed" using the correct method in Windows, rather than just...
Microsoft informs Windows 7 users that support will stop next year - 03/21/2019 08:51 AM
Microsoft has started notifying users of Windows 7 that support will be halted next year. A patch was released on Wednesday that will continue to remind users of that happening next year....
Senior Member
Posts: 8855
Joined: 2010-08-28
Don't get me wrong, it's a nice gesture.
But this way businisses never upgrade.
Senior Member
Posts: 348
Joined: 2018-03-01
No thanks. Just installed an update on W7 a few weeks ago and now my startup time takes twice as long.
Senior Member
Posts: 15700
Joined: 2018-03-21
I don't have this problem.
Senior Member
Posts: 761
Joined: 2008-03-03
Which one?
Senior Member
Posts: 15700
Joined: 2018-03-21
Alternative mitigation
>1. Disable Remote Desktop Services if they are not required.
This is a near zero low-risk vulnerability for client users, the default settings for the affected service are Manual(Not Started) and require the user to initiate or actually make use of the services.
On enterprise or server builds where the service is set to accept user connections for headless config is where this worm will proliferate.
its certainly not sasser levels of serious where LSASS is running on every machine.