The blackhat-hackers took advantage of undisclosed vulnerabilities in Microsoft’s code. That would have been a potentially damaging develo...
The company said it has not seen any evidence that hackers have used the technique. Amit Yoran, CEO of security firm Tenable, said it is “exceptionally rare if not unprecedented” for the U.S. government to share its discovery of such a critical vulnerability with a company. Yoran, who was a founding director of the Department of Homeland Security’s computer emergency readiness team, urged all organizations to prioritize patching their systems quickly. An advisory sent by the NSA on Tuesday said “the consequences of not patching the vulnerability are severe and widespread.”
![]() |
Microsoft no longer supports Windows 7. MORE |
“The biggest risk is to secure communications,” said Adam Meyers, vice president of intelligence for security firm CrowdStrike. Some computers will get the fix automatically if they have the automatic update option turned on. Others can get it manually by going to Windows Update in the computer’s settings. Microsoft typically releases security and other updates once a month and waited until Tuesday to disclose the flaw and the NSA’s involvement.
Microsoft and the NSA both declined to say when the agency privately notified the company. The agency shared the vulnerability with Microsoft “quickly and responsibly,” Neal Ziring, technical director of the NSA’s cybersecurity directorate, said in a blog post Tuesday.
Priscilla Moriuchi, who retired from the NSA in 2017 after running its East Asia and Pacific operations, said this is a good example of the “constructive role” that the NSA can play in improving global information security. Moriuchi, now an analyst at the U.S. cybersecurity firm Recorded Future, said it’s likely a reflection of changes made in 2017 to how the U.S. determines whether to disclose a major vulnerability or exploit it for intelligence purposes.
