National Security Agency Discovers Vulnerability in Microsoft Windows
SEATTLE — The National Security Agency announced that it had found a “critical vulnerability” in Microsoft Corp.’s Windows operating systems that could enable cyber intrusions.
The NSA recognized “the severity of the vulnerability” and disclosed it to Microsoft to expedite the process of fixing it, according to Anne Neuberger, the NSA’s director of cybersecurity, speaking to reporters on Tuesday. Microsoft released a patch the same day.
The Cybersecurity and Infrastructure Security Agency, part of the Department of Homeland Security, released an emergency directive on Tuesday, saying that it “strongly recommends organizations install these critical patches as soon as possible.” DHS is urging federal civilian agencies to take “a series of immediate actions to mitigate this risk and to minimize the exposure to associated threats to our federal information systems,” said Bryan Ware, an assistant secretary in the department.
The NSA chose to publicly share that it had found the flaw — a break from past protocol when information about how vulnerabilities were discovered wasn’t made public — in order to build trust and encourage patching, Neuberger said.
“We wanted to take a new approach to sharing and also really work to build trust with the cybersecurity community,” she said.
Microsoft hasn’t seen the flaw used in active attacks, the company said in announcing the patch.
The flaw lies in a part of Windows software known as Crypt32.dll. That file is used by Windows 10 and the last two versions of the Windows Server operating systems — to implement “many of the Certificate and Cryptographic Messaging functions in the CryptoAPI, such as CryptSignMessage” — according to Microsoft. This means that the flaw could affect a broad range of users.
The disclosure appears to represent an improvement in relations between Microsoft and the NSA, which previously secretly collected security exploits of Microsoft’s Windows in order to use the tools for its own hacks. Details of the practice became public in 2017 when a group known as the Shadow Brokers obtained and published the NSA’s tools, leading to an emergency for Microsoft as the company rushed to patch the “zero day” exploits. One month later, Microsoft blamed the NSA exploits for the global spread of malicious software called “WannaCrypt.”
Microsoft has a policy of regularly releasing security updates on the second Tuesday of each month, and this update aligns with that schedule, according to a Monday statement by Jeff Jones, a senior director at the company.
“We follow the principles of coordinated vulnerability disclosure (CVD) as the industry best practice to protect our customers from reported security vulnerabilities,” Jones said in the statement. “To prevent unnecessary risk to customers, security researchers and vendors do not discuss the details of reported vulnerabilities before an update is available.”
News of the NSA’s discovery was previously reported by The Washington Post and Krebs on Security, a cybersecurity blog.
The release of the patch draws attention to the flaw and creates an urgency for organizations to fix it before bad actors use it for malicious purposes, according to government officials.
“Sophisticated cyber actors will understand the underlying flaw very quickly and, if exploited, would render the previously mentioned platforms as fundamentally vulnerable,” the NSA said in a Tuesday advisory about the vulnerability.
“Because patches have been publicly released, the underlying vulnerabilities can be reverse-engineered to create exploits to target unpatched systems,” according to the Cybersecurity and Infrastructure Security Agency.
Bass reported from Seattle, Sebenius from Washington.
©2020 Bloomberg News
Visit Bloomberg News at www.bloomberg.com
Distributed by Tribune Content Agency, LLC.
In The News
ATLANTA (AP) — State and local officials are receiving additional tools from the federal government to help defend the nation’s election systems from cyberthreats ahead of the November vote, as intelligence officials continue to warn about foreign efforts to interfere in the U.S. election. Under a $2.2 million... Read More
WASHINGTON - A bipartisan trio of senators urged their colleagues Tuesday to create a $10 billion fund to extend broadband cable access into underserved rural communities. The Governors' Broadband Development Fund bill was introduced by Sen. Tim Scott, R-S.C., and his co-sponsors, Sens. Lindsey Graham, R-S.C.,... Read More
WASHINGTON -- The chief executives of the biggest computer and Internet companies faced tough questioning in Congress Wednesday on whether they have too much control over the U.S. market. Some lawmakers want to break up their dominance under federal antitrust laws. Amazon, Apple, Facebook and Google... Read More
WASHINGTON - The Trump administration is accused in a new lawsuit in Washington, D.C., of trying to squelch media rights of a nonprofit organization that receives grants from the U.S. government. The Washington-based Open Technology Fund says the Trump administration is trying to intimidate it, perhaps... Read More
WASHINGTON — In recent weeks, House appropriators have approved hundreds of billions of dollars in government funding for fiscal 2021, culminating in the Appropriations Committee’s July 15 approval of legislation that would provide nearly $51 billion for the Homeland Security Department. With all 12 of the... Read More
WASHINGTON— The Supreme Court on Monday upheld a 1991 law that bars robocalls to cellphones. The case, argued by telephone in May because of the coronavirus pandemic, stems from a 2015 decision by Congress to carve out an exception to the Telephone Consumer Protection Act. The... Read More