Microsoft SMB vulnerabilities patch MS17-010 (Ransomware WannaCry) Impact to TIBCO Products
book
Article ID: KB0108121
calendar_today
Updated On:
Description
Microsoft SMB Zero Day (WannaCry Ransomware Attack) vulnerabilities impact multiple versions of the Microsoft Windows operating system. Any software deployed on a vulnerable operating system is at risk. Customers are strongly encouraged to assess their exposure to these risks and are responsible for the security of the operating systems they use to run TIBCO software. As part of a comprehensive defense-in-depth strategy, TIBCO encourages all customers to stay current with operating system patches.
Issue/Introduction
Microsoft SMB vulnerabilities patch MS17-010 (Ransomware WannaCry) impact on TIBCO Products.
Resolution
Consider the following remediations.
1). To protect TIBCO products and any other software running on vulnerable systems, Microsoft recommends applying the patch that they have provided.
https://technet.microsoft.com/en-us/library/security/ms17-010.aspx.
2). If applying a patch is currently not feasible, disabling SMB/CIFS connectivity can prevent a particular attack. Microsoft describes how to temporarily disable SMB/CIFS functionality at the following.
https://support.microsoft.com/en-us/help/2696547/how-to-enable-and-disable-smbv1,-smbv2,-and-smbv3-in-windows-vista,-windows-server-2008,-windows-7,-windows-server-2008-r2,-windows-8,-and-windows-server-2012. This is not recommended except as a short-term work-around, as it will break functionality on the machine.
3). Configure network routers to block outbound SMB. Consider blocking outbound SMB connections (TCP ports 139 and 445 along with UDP ports 137 and 138) from the local network to the WAN.
https://www.kb.cert.org/vuls/id/867968
Disclaimer:
TIBCO provides this information regarding exposure to the known vulnerability in good faith and makes reasonable efforts to supply correct, current, and high quality guidance. However, TIBCO is releasing the results of our findings solely on an "as is" basis without any express or implied warranties, undertakings or guarantees.
Additional Information
https://support.microsoft.com/en-us/help/4013081/title
https://technet.microsoft.com/en-us/library/security/ms17-017.aspx
http://www.kb.cert.org/vuls/id/867968
https://www.us-cert.gov/ncas/current-activity/2017/02/03/CERTCC-Reports-Microsoft-SMB-Vulnerability
Feedback
thumb_up
Yes
thumb_down
No