Feds respond to critical Windows flaw
OMB and DHS are collaborating on implementing the fix across federal networks.
Microsoft's latest weekly security bulletin released Feb. 10 contained patch instructions to fix a critical vulnerability affecting versions of the Windows operating systems. An attacker could exploit the flaw to gain user access to affected systems, including administrative access, depending on how the attack is directed. Users become vulnerable by connecting over unknown networks, like a coffee-shop Wi-Fi connection.
Known as "JASBUG," the flaw requires the implementation of a complex set of patches that go beyond the download-and-restart installation.
"This is not just a configuration issue in the code, this is an actual problem in the code," White House cybersecurity advisor Michael Daniel said at a meeting of the Information Security and Privacy Advisory Board of the National Institute for Standards and Technology. "You can't just implement the patch. You can break things if you do it incorrectly."
The Office of Management and Budget and the Department of Homeland Security are collaborating on implementing the fix across federal networks.
"The more challenging feature of this is sort of rolling this out across all federal agencies, getting them to implement it, and do that in a way that doesn't break anything significant as we're doing it. We've got a good schedule laid out and OMB and DHS have been doing a good job about that," Daniel said.
The National Cybersecurity and Communications Integration Center is addressing the problem at DHS. The U.S. Computer Emergency Readiness Team released an alert about the vulnerability.
"We are working with other agencies across the executive branch and critical infrastructure entities to determine any potential risk and to implement mitigation strategies as necessary," DHS spokesman S.Y. Lee said.
"I think that we learned a lot from our experience going through Heartbleed, and we got a little bit better with Bash, and I think that in this case we were able to get our act together in time so that we were ready for the patch when it actually rolled out," Daniel said. "In some ways this is a good news story on the government side. We actually did learn something from previous vulnerabilities and adjusted our processes to get a little bit ahead of it."