Third, numerous organizations still use the affected Windows operating systems. Although Microsoft will no longer support Windows 7 and its server siblings after January 20, 2020, over 36% of the Desktop market is still currently using Windows 7. Worse yet, an estimated 40 million PCs still use Windows XP although Microsoft stopped supporting that operating system on April 8, 2014, over five years ago. It’s clear that many organizations and users will continue using Windows 7 and Windows Server 2008 up to the end-of-support date and, based on historical precedent, well past the support termination date.
Fourth, this vulnerability enables hackers to create a worm attack through remote code execution. Why is this so dangerous? Computer and IT systems often have vulnerabilities but many of them are isolated to that particular system or a piece of software or application running on that system. To exploit these vulnerabilities, hackers must first gain access to the system. A remote code execution exploit is one of the most dangerous types of exploits because hackers or malicious software can remotely access and execute software on other systems often without needing to authenticate, and they can even program this activity so that it occurs immediately. Thus, malicious software that infects a single device has the ability to quickly spread, or “worm”, it’s way throughout the entire environment. During the WannaCry attack, tens of thousands of computers within individual organizations were infected in less than a minute. When Microsoft itself is using the title: “Prevent a worm by updating Remote Desktop Services” for its blog post announcing this vulnerability, it’s evident this is a serious security concern.
As Simon Pope, director of incident response at Microsoft’s Security Response Center explains in Microsoft’s blog post, “This vulnerability is pre-authentication and requires no user interaction. In other words, the vulnerability is ‘wormable’, meaning that any future malware that exploits this vulnerability could propagate from vulnerable computer to vulnerable computer in a similar way as the WannaCry malware spread across the globe in 2017.”
Fifth, due to the nature of a remote code execution exploit, a single vulnerable or “unpatched” system can still compromise the entire IT infrastructure, including devices that are “patched” or secure from the vulnerability. How is this possible? The NotPetya worm attack, which also leveraged the EternalBlue exploit, is a perfect example of how even just a few vulnerable systems can lead to total infrastructure compromise. When a remote code execution exploit is paired with password, token, or credential stealing techniques or exploits (or worse yet a built-in set of valid privileged account credentials, e.g. the Olympic Destroyer malware), the malicious worm can now use legitimate remote execution protocols and privileged credentials to spread.
Here’s a play-by-play explaining in more detail the situation above: