Network Security, Patch/Configuration Management, Vulnerability Management

New Windows flaw could allow a WannaCry like attack if not patched

Network administrators and computer owners are once again being implored to make sure that they have updated Windows to block a WannaCry-like vulnerability.

Check Point researchers have noted that Windows vulnerability CVE-2017-8620 is a flaw inside all current versions of the operating system that could allow worm-like malware to take hold and spread throughout a network. The fact that this is a known, patched issue with Windows make CVE-2017-8620 exactly the same as what happened with the flaw known as Eternal Blue, which was discovered, patched and then exploited in launching the WannaCry attack in May.

A Check Point spokesman told SC Media that no special hackers tool is needed and once exploited any malware would be able to use this exploit and infect computers. 

“The exact same thing could now happen with the newly discovered vulnerability, if computer users do not implement the security patch to protect endpoints and networks. The writing is on the wall. Users and organizations must learn  the lesson from the WannaCry attack, and upgrade their protections now, before it's too late,” Check point reported.

According to the Mitre organization, the flaw impacts, “Windows Search in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows a remote code execution vulnerability when it improperly handles objects in memory, aka "Windows Search Remote Code Execution Vulnerability".

In addition, the National Vulnerability Database further described the flaw as allowing unauthorized disclosure of information; unauthorized modification; and disruption of service.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.